cp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) [ 1549.675838] FAULT_INJECTION: forcing a failure. [ 1549.675838] name failslab, interval 1, probability 0, space 0, times 0 [ 1549.678351] CPU: 1 PID: 10003 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1549.679862] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1549.681676] Call Trace: [ 1549.682270] dump_stack+0x107/0x167 [ 1549.683081] should_fail.cold+0x5/0xa [ 1549.683920] ? __d_alloc+0x2a/0x990 [ 1549.684734] should_failslab+0x5/0x20 [ 1549.685583] kmem_cache_alloc+0x5b/0x310 [ 1549.686492] __d_alloc+0x2a/0x990 [ 1549.687269] ? find_held_lock+0x2c/0x110 [ 1549.688175] d_alloc_pseudo+0x19/0x70 [ 1549.689013] alloc_file_pseudo+0xce/0x250 [ 1549.689941] ? trace_hardirqs_on+0x5b/0x180 [ 1549.690887] ? alloc_file+0x5a0/0x5a0 [ 1549.691755] anon_inode_getfile+0xc8/0x1f0 [ 1549.692696] io_uring_setup+0x138b/0x2980 [ 1549.693619] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1549.694765] ? wait_for_completion_io+0x270/0x270 [ 1549.695855] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1549.696999] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1549.698146] do_syscall_64+0x33/0x40 [ 1549.698961] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1549.700099] RIP: 0033:0x7fcc97c5ab19 [ 1549.700901] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1549.705108] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1549.706852] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1549.708442] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1549.710065] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1549.711646] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1549.713233] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1549.725715] FAULT_INJECTION: forcing a failure. [ 1549.725715] name failslab, interval 1, probability 0, space 0, times 0 [ 1549.728382] CPU: 1 PID: 10012 Comm: syz-executor.7 Not tainted 5.10.230 #1 [ 1549.729889] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1549.731758] Call Trace: [ 1549.732346] dump_stack+0x107/0x167 [ 1549.733159] should_fail.cold+0x5/0xa [ 1549.734021] ? create_object.isra.0+0x3a/0xa20 [ 1549.735006] should_failslab+0x5/0x20 [ 1549.735845] kmem_cache_alloc+0x5b/0x310 [ 1549.736732] create_object.isra.0+0x3a/0xa20 [ 1549.737712] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1549.738837] kmem_cache_alloc+0x159/0x310 [ 1549.739759] security_inode_alloc+0x34/0x160 [ 1549.740747] inode_init_always+0xa4e/0xd10 [ 1549.741680] ? shmem_destroy_inode+0x70/0x70 [ 1549.742711] alloc_inode+0x84/0x240 [ 1549.743512] new_inode+0x23/0x250 [ 1549.744296] shmem_get_inode+0x15e/0xbc0 [ 1549.745199] __shmem_file_setup+0xb8/0x320 [ 1549.746151] ? _copy_from_user+0xfb/0x1b0 [ 1549.747077] __do_sys_memfd_create+0x275/0x450 [ 1549.748090] ? memfd_file_seals_ptr+0x170/0x170 [ 1549.749116] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1549.750258] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1549.751422] do_syscall_64+0x33/0x40 [ 1549.752280] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1549.753427] RIP: 0033:0x7f3576682b19 [ 1549.754269] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1549.758452] RSP: 002b:00007f3573bf7f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1549.760116] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f3576682b19 [ 1549.761729] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f35766dc0fb [ 1549.763292] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1549.764877] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1549.766475] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000140 [ 1549.775860] FAULT_INJECTION: forcing a failure. [ 1549.775860] name failslab, interval 1, probability 0, space 0, times 0 [ 1549.778567] CPU: 1 PID: 10019 Comm: syz-executor.4 Not tainted 5.10.230 #1 [ 1549.780082] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1549.781965] Call Trace: [ 1549.782531] dump_stack+0x107/0x167 [ 1549.783322] should_fail.cold+0x5/0xa [ 1549.784191] ? create_object.isra.0+0x3a/0xa20 [ 1549.785201] should_failslab+0x5/0x20 [ 1549.786067] kmem_cache_alloc+0x5b/0x310 [ 1549.786973] create_object.isra.0+0x3a/0xa20 [ 1549.787966] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1549.789083] kmem_cache_alloc+0x159/0x310 [ 1549.790045] security_inode_alloc+0x34/0x160 [ 1549.791016] inode_init_always+0xa4e/0xd10 [ 1549.791959] ? shmem_destroy_inode+0x70/0x70 [ 1549.792948] alloc_inode+0x84/0x240 [ 1549.793770] new_inode+0x23/0x250 [ 1549.794562] shmem_get_inode+0x15e/0xbc0 [ 1549.795484] __shmem_file_setup+0xb8/0x320 [ 1549.796422] ? _copy_from_user+0xfb/0x1b0 [ 1549.797389] __do_sys_memfd_create+0x275/0x450 [ 1549.798416] ? memfd_file_seals_ptr+0x170/0x170 [ 1549.799457] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1549.800630] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1549.801806] do_syscall_64+0x33/0x40 [ 1549.802648] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1549.803772] RIP: 0033:0x7f50ad7e0b19 [ 1549.804594] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1549.808741] RSP: 002b:00007f50aad55f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1549.810480] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f50ad7e0b19 [ 1549.812086] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f50ad83a0fb [ 1549.813682] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1549.815335] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1549.816941] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000140 22:03:25 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af83", 0xcb}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349", 0x60}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1549.825662] FAULT_INJECTION: forcing a failure. [ 1549.825662] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1549.828515] CPU: 1 PID: 10017 Comm: syz-executor.3 Not tainted 5.10.230 #1 [ 1549.830040] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1549.831872] Call Trace: [ 1549.832435] dump_stack+0x107/0x167 [ 1549.833245] should_fail.cold+0x5/0xa [ 1549.834125] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 1549.835342] ? shmem_write_begin+0xf7/0x1d0 [ 1549.836314] ? shmem_write_begin+0x100/0x1d0 [ 1549.837288] generic_perform_write+0x279/0x4f0 [ 1549.838326] ? page_cache_prev_miss+0x310/0x310 [ 1549.839346] ? evict_inodes+0x470/0x470 [ 1549.840245] ? generic_write_checks+0x2ad/0x390 [ 1549.841263] __generic_file_write_iter+0x39d/0x5d0 [ 1549.842360] generic_file_write_iter+0xdb/0x230 [ 1549.843359] ? iov_iter_init+0x3c/0x130 [ 1549.844232] new_sync_write+0x42c/0x660 [ 1549.845098] ? new_sync_read+0x6f0/0x6f0 [ 1549.845989] ? __x64_sys_pwrite64+0x201/0x260 [ 1549.846964] ? lock_release+0x680/0x680 [ 1549.847833] ? selinux_file_permission+0x92/0x520 [ 1549.848868] ? security_file_permission+0xb1/0xe0 [ 1549.849934] vfs_write+0x7c0/0xb10 [ 1549.850721] __x64_sys_pwrite64+0x201/0x260 [ 1549.851671] ? ksys_pwrite64+0x1b0/0x1b0 [ 1549.852552] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1549.853686] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1549.854825] do_syscall_64+0x33/0x40 [ 1549.855641] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1549.856762] RIP: 0033:0x7fcc93db7ab7 [ 1549.857589] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1549.861623] RSP: 002b:00007fcc91379f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1549.863302] RAX: ffffffffffffffda RBX: 00007fcc93e4e970 RCX: 00007fcc93db7ab7 [ 1549.864850] RDX: 000000000000005a RSI: 0000000020000540 RDI: 0000000000000005 [ 1549.866446] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1549.868043] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000005 [ 1549.869608] R13: 0000000000000005 R14: 0000000020000440 R15: 0000000000000000 22:03:25 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af83", 0xcb}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349", 0x60}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1549.882006] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:03:25 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) 22:03:25 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af83", 0xcb}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349", 0x60}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:03:25 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) 22:03:25 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 41) [ 1550.081639] FAULT_INJECTION: forcing a failure. [ 1550.081639] name failslab, interval 1, probability 0, space 0, times 0 [ 1550.083990] CPU: 0 PID: 10044 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1550.085400] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1550.087087] Call Trace: [ 1550.087632] dump_stack+0x107/0x167 [ 1550.088374] should_fail.cold+0x5/0xa [ 1550.089146] ? create_object.isra.0+0x3a/0xa20 [ 1550.090093] should_failslab+0x5/0x20 [ 1550.090878] kmem_cache_alloc+0x5b/0x310 [ 1550.091721] create_object.isra.0+0x3a/0xa20 [ 1550.092612] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1550.093651] kmem_cache_alloc+0x159/0x310 [ 1550.094513] __d_alloc+0x2a/0x990 [ 1550.095218] ? find_held_lock+0x2c/0x110 [ 1550.096045] d_alloc_pseudo+0x19/0x70 [ 1550.096817] alloc_file_pseudo+0xce/0x250 [ 1550.097657] ? trace_hardirqs_on+0x5b/0x180 [ 1550.098534] ? alloc_file+0x5a0/0x5a0 [ 1550.099320] anon_inode_getfile+0xc8/0x1f0 [ 1550.100178] io_uring_setup+0x138b/0x2980 [ 1550.101023] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1550.102054] ? wait_for_completion_io+0x270/0x270 [ 1550.103059] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1550.104117] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1550.105160] do_syscall_64+0x33/0x40 [ 1550.105952] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1550.106992] RIP: 0033:0x7fcc97c5ab19 [ 1550.107750] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1550.111475] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1550.113012] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1550.114465] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1550.115906] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1550.117365] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1550.118821] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1550.152534] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1550.155511] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1550.173492] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:03:39 executing program 6: getpgid(0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x22902, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_io_uring_complete(0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x5d, 0x0, @thr={&(0x7f00000002c0)="c58435b56fadce6925a8c5ef8299d1c9436890996f121c55fd3949c7ffe74e562d5b7ad3ba81ec2ee03296fc177baf9eb677c3b886f2d2f6f15bbb7648f001000000a7e1de93ae4056fd27712f2d24552e5d7d39ec16e048786d22b4989871bad0f0ee169831b6e6f3e5f6aec27d337087b8119f6d755f6e40547c31e63fdaf4b4593725c72c370172c9527216a415009b28cfab12175e4c530e215b70f7b654b1cc73e9eabfb340bcf589b70ae5e8acd00b6770b80a2a135bf9bd68f3679d8a46b4c50a69d29136daef4804fe9cb5f8caceaeb2b7310d7154d547c522215a4a59b9787a63c4e818bd23c5668aa30f9e030613", 0x0}}, &(0x7f0000000180)) r1 = socket$netlink(0x10, 0x3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000080)=""/200, 0x20000148}], 0x1, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000003c0)=""/101, 0x65) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000240), &(0x7f0000000440)={'L-', 0x3}, 0x16, 0x3) 22:03:39 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) [ 1564.079029] FAULT_INJECTION: forcing a failure. [ 1564.079029] name failslab, interval 1, probability 0, space 0, times 0 [ 1564.082557] CPU: 1 PID: 10067 Comm: syz-executor.7 Not tainted 5.10.230 #1 [ 1564.084300] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1564.084373] FAULT_INJECTION: forcing a failure. [ 1564.084373] name failslab, interval 1, probability 0, space 0, times 0 [ 1564.086408] Call Trace: [ 1564.086435] dump_stack+0x107/0x167 [ 1564.086458] should_fail.cold+0x5/0xa [ 1564.086482] ? __d_alloc+0x2a/0x990 [ 1564.086506] should_failslab+0x5/0x20 [ 1564.086535] kmem_cache_alloc+0x5b/0x310 [ 1564.094135] ? trace_hardirqs_on+0x5b/0x180 [ 1564.095237] __d_alloc+0x2a/0x990 [ 1564.096113] d_alloc_pseudo+0x19/0x70 [ 1564.097068] alloc_file_pseudo+0xce/0x250 [ 1564.098114] ? alloc_file+0x5a0/0x5a0 [ 1564.099080] ? shmem_get_inode+0x55c/0xbc0 [ 1564.099955] __shmem_file_setup+0x144/0x320 [ 1564.100838] ? _copy_from_user+0xfb/0x1b0 [ 1564.101692] __do_sys_memfd_create+0x275/0x450 [ 1564.102632] ? memfd_file_seals_ptr+0x170/0x170 [ 1564.103584] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1564.104648] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1564.105696] do_syscall_64+0x33/0x40 [ 1564.106470] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1564.107516] RIP: 0033:0x7f3576682b19 [ 1564.108277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1564.112036] RSP: 002b:00007f3573bf7f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1564.113584] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f3576682b19 [ 1564.115052] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f35766dc0fb [ 1564.116500] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1564.117956] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1564.119420] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000140 [ 1564.120914] CPU: 0 PID: 10070 Comm: syz-executor.4 Not tainted 5.10.230 #1 [ 1564.122394] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1564.124369] Call Trace: [ 1564.124926] dump_stack+0x107/0x167 [ 1564.125688] should_fail.cold+0x5/0xa [ 1564.126288] FAULT_INJECTION: forcing a failure. [ 1564.126288] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1564.126495] ? __d_alloc+0x2a/0x990 [ 1564.126524] should_failslab+0x5/0x20 [ 1564.130387] kmem_cache_alloc+0x5b/0x310 [ 1564.131229] ? trace_hardirqs_on+0x5b/0x180 [ 1564.132135] __d_alloc+0x2a/0x990 [ 1564.132859] d_alloc_pseudo+0x19/0x70 [ 1564.133659] alloc_file_pseudo+0xce/0x250 [ 1564.134531] ? alloc_file+0x5a0/0x5a0 [ 1564.135335] ? shmem_get_inode+0x55c/0xbc0 [ 1564.136226] __shmem_file_setup+0x144/0x320 [ 1564.137124] ? _copy_from_user+0xfb/0x1b0 [ 1564.137991] __do_sys_memfd_create+0x275/0x450 [ 1564.138966] ? memfd_file_seals_ptr+0x170/0x170 [ 1564.139943] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1564.141033] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1564.142107] do_syscall_64+0x33/0x40 [ 1564.142893] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1564.143959] RIP: 0033:0x7f50ad7e0b19 [ 1564.144734] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1564.148568] RSP: 002b:00007f50aad55f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1564.150153] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f50ad7e0b19 [ 1564.151646] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f50ad83a0fb [ 1564.153128] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1564.154634] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1564.156116] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000140 [ 1564.157633] CPU: 1 PID: 10071 Comm: syz-executor.3 Not tainted 5.10.230 #1 [ 1564.159128] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1564.160821] Call Trace: [ 1564.161370] dump_stack+0x107/0x167 [ 1564.161973] FAULT_INJECTION: forcing a failure. [ 1564.161973] name failslab, interval 1, probability 0, space 0, times 0 [ 1564.162121] should_fail.cold+0x5/0xa [ 1564.162147] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 1564.162184] ? shmem_write_begin+0xf7/0x1d0 [ 1564.167181] ? shmem_write_begin+0x100/0x1d0 [ 1564.168097] generic_perform_write+0x279/0x4f0 [ 1564.169055] ? page_cache_prev_miss+0x310/0x310 [ 1564.170010] ? evict_inodes+0x470/0x470 [ 1564.170842] ? generic_write_checks+0x2ad/0x390 [ 1564.171808] __generic_file_write_iter+0x39d/0x5d0 [ 1564.172825] generic_file_write_iter+0xdb/0x230 [ 1564.173775] ? iov_iter_init+0x3c/0x130 [ 1564.174610] new_sync_write+0x42c/0x660 [ 1564.175436] ? new_sync_read+0x6f0/0x6f0 [ 1564.176270] ? __x64_sys_pwrite64+0x201/0x260 [ 1564.177202] ? lock_release+0x680/0x680 [ 1564.178023] ? selinux_file_permission+0x92/0x520 [ 1564.179035] ? security_file_permission+0xb1/0xe0 [ 1564.180036] vfs_write+0x7c0/0xb10 [ 1564.180779] __x64_sys_pwrite64+0x201/0x260 [ 1564.181657] ? ksys_pwrite64+0x1b0/0x1b0 [ 1564.182504] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1564.183558] do_syscall_64+0x33/0x40 [ 1564.184320] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1564.185363] RIP: 0033:0x7fcc93db7ab7 [ 1564.186330] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1564.190044] RSP: 002b:00007fcc91379f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1564.191605] RAX: ffffffffffffffda RBX: 00007fcc93e4e970 RCX: 00007fcc93db7ab7 [ 1564.193056] RDX: 000000000000005a RSI: 0000000020000540 RDI: 0000000000000005 [ 1564.194512] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1564.195967] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000005 [ 1564.197425] R13: 0000000000000005 R14: 0000000020000440 R15: 0000000000000000 [ 1564.198919] CPU: 0 PID: 10069 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1564.200375] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1564.202100] Call Trace: [ 1564.202698] dump_stack+0x107/0x167 [ 1564.203541] should_fail.cold+0x5/0xa [ 1564.204340] ? create_object.isra.0+0x3a/0xa20 [ 1564.205303] should_failslab+0x5/0x20 [ 1564.206098] kmem_cache_alloc+0x5b/0x310 [ 1564.206964] create_object.isra.0+0x3a/0xa20 [ 1564.207880] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1564.208945] kmem_cache_alloc_trace+0x151/0x320 [ 1564.209920] ? io_async_queue_proc+0x80/0x80 [ 1564.210858] percpu_ref_init+0xd8/0x3d0 [ 1564.211695] io_rsrc_node_switch_start.part.0+0x6a/0x250 [ 1564.212822] io_uring_setup+0x14f6/0x2980 [ 1564.213689] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1564.214756] ? wait_for_completion_io+0x270/0x270 [ 1564.215782] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1564.216868] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1564.217943] do_syscall_64+0x33/0x40 [ 1564.218725] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1564.219798] RIP: 0033:0x7fcc97c5ab19 [ 1564.220576] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1564.224413] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1564.226165] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1564.227682] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1564.229174] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1564.230670] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1564.232152] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 22:03:39 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 8) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:03:39 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af83", 0xcb}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d", 0x62}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:03:40 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 16) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:03:40 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 8) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:03:40 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 42) [ 1564.326262] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1564.341339] FAULT_INJECTION: forcing a failure. [ 1564.341339] name failslab, interval 1, probability 0, space 0, times 0 [ 1564.343948] CPU: 1 PID: 10082 Comm: syz-executor.7 Not tainted 5.10.230 #1 [ 1564.345365] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1564.347066] Call Trace: [ 1564.347617] dump_stack+0x107/0x167 [ 1564.348372] should_fail.cold+0x5/0xa [ 1564.349166] ? create_object.isra.0+0x3a/0xa20 [ 1564.350112] should_failslab+0x5/0x20 [ 1564.350910] kmem_cache_alloc+0x5b/0x310 [ 1564.351764] create_object.isra.0+0x3a/0xa20 [ 1564.352664] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1564.353710] kmem_cache_alloc+0x159/0x310 [ 1564.354583] ? trace_hardirqs_on+0x5b/0x180 [ 1564.355486] __d_alloc+0x2a/0x990 [ 1564.356214] d_alloc_pseudo+0x19/0x70 [ 1564.357000] alloc_file_pseudo+0xce/0x250 [ 1564.357848] ? alloc_file+0x5a0/0x5a0 [ 1564.358654] ? shmem_get_inode+0x55c/0xbc0 [ 1564.359558] __shmem_file_setup+0x144/0x320 [ 1564.360450] ? _copy_from_user+0xfb/0x1b0 [ 1564.361305] __do_sys_memfd_create+0x275/0x450 [ 1564.362256] ? memfd_file_seals_ptr+0x170/0x170 [ 1564.363214] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1564.364290] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1564.365343] do_syscall_64+0x33/0x40 [ 1564.366107] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1564.367166] RIP: 0033:0x7f3576682b19 [ 1564.367950] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1564.371721] RSP: 002b:00007f3573bf7f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1564.373278] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f3576682b19 [ 1564.374753] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f35766dc0fb [ 1564.376210] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1564.377674] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1564.379144] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000140 22:03:40 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 9) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:03:40 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 17) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:03:40 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 43) 22:03:40 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 9) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) [ 1564.465703] FAULT_INJECTION: forcing a failure. [ 1564.465703] name failslab, interval 1, probability 0, space 0, times 0 [ 1564.468664] CPU: 1 PID: 10088 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1564.470196] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1564.472045] Call Trace: [ 1564.472634] dump_stack+0x107/0x167 [ 1564.473437] should_fail.cold+0x5/0xa [ 1564.474287] ? create_object.isra.0+0x3a/0xa20 [ 1564.475297] should_failslab+0x5/0x20 [ 1564.476124] kmem_cache_alloc+0x5b/0x310 [ 1564.477015] create_object.isra.0+0x3a/0xa20 [ 1564.478006] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1564.479170] kmem_cache_alloc+0x159/0x310 [ 1564.480114] __alloc_file+0x21/0x320 [ 1564.480929] alloc_empty_file+0x6d/0x170 [ 1564.481830] alloc_file+0x5e/0x5a0 [ 1564.482626] alloc_file_pseudo+0x16a/0x250 [ 1564.483550] ? alloc_file+0x5a0/0x5a0 [ 1564.484417] anon_inode_getfile+0xc8/0x1f0 [ 1564.485338] io_uring_setup+0x138b/0x2980 [ 1564.486276] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1564.487413] ? wait_for_completion_io+0x270/0x270 [ 1564.488500] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1564.489680] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1564.490834] do_syscall_64+0x33/0x40 [ 1564.491649] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1564.492763] RIP: 0033:0x7fcc97c5ab19 [ 1564.493584] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1564.497666] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1564.499334] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1564.500867] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1564.502483] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1564.504062] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1564.505624] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 22:03:40 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af83", 0xcb}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d", 0x62}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1564.523922] FAULT_INJECTION: forcing a failure. [ 1564.523922] name failslab, interval 1, probability 0, space 0, times 0 [ 1564.526802] CPU: 0 PID: 10092 Comm: syz-executor.4 Not tainted 5.10.230 #1 [ 1564.528253] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1564.529974] Call Trace: [ 1564.530579] dump_stack+0x107/0x167 [ 1564.531338] should_fail.cold+0x5/0xa [ 1564.532143] ? create_object.isra.0+0x3a/0xa20 [ 1564.533099] should_failslab+0x5/0x20 [ 1564.533898] kmem_cache_alloc+0x5b/0x310 [ 1564.534760] create_object.isra.0+0x3a/0xa20 [ 1564.535673] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1564.536740] kmem_cache_alloc+0x159/0x310 [ 1564.537623] __d_alloc+0x2a/0x990 [ 1564.538357] d_alloc_pseudo+0x19/0x70 [ 1564.539155] alloc_file_pseudo+0xce/0x250 [ 1564.540094] ? alloc_file+0x5a0/0x5a0 [ 1564.540900] ? shmem_get_inode+0x55c/0xbc0 [ 1564.541797] __shmem_file_setup+0x144/0x320 [ 1564.542727] ? _copy_from_user+0xfb/0x1b0 [ 1564.543596] __do_sys_memfd_create+0x275/0x450 [ 1564.544552] ? memfd_file_seals_ptr+0x170/0x170 [ 1564.545537] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1564.546657] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1564.547747] do_syscall_64+0x33/0x40 [ 1564.548542] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1564.549615] RIP: 0033:0x7f50ad7e0b19 [ 1564.550410] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1564.554292] RSP: 002b:00007f50aad55f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1564.555895] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f50ad7e0b19 [ 1564.557394] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f50ad83a0fb [ 1564.558889] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1564.560392] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1564.561886] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000140 22:03:40 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 44) [ 1564.594587] FAULT_INJECTION: forcing a failure. [ 1564.594587] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1564.597338] CPU: 0 PID: 10095 Comm: syz-executor.3 Not tainted 5.10.230 #1 [ 1564.598776] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1564.600502] Call Trace: [ 1564.601057] dump_stack+0x107/0x167 [ 1564.601808] should_fail.cold+0x5/0xa [ 1564.602607] __alloc_pages_nodemask+0x182/0x600 [ 1564.603574] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1564.604805] ? lock_downgrade+0x6d0/0x6d0 [ 1564.605658] ? lock_acquire+0x197/0x470 [ 1564.606496] alloc_pages_vma+0xbb/0x410 [ 1564.607322] shmem_alloc_page+0x10f/0x1e0 [ 1564.608194] ? shmem_init_inode+0x20/0x20 [ 1564.609075] ? percpu_counter_add_batch+0x8b/0x140 [ 1564.610095] ? __vm_enough_memory+0x184/0x360 [ 1564.611035] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 1564.612146] ? shmem_unuse_inode+0xf60/0xf60 [ 1564.613052] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1564.614108] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1564.615170] shmem_write_begin+0xf7/0x1d0 [ 1564.616028] generic_perform_write+0x20a/0x4f0 [ 1564.616977] ? page_cache_prev_miss+0x310/0x310 [ 1564.617942] ? evict_inodes+0x470/0x470 [ 1564.618769] ? generic_write_checks+0x2ad/0x390 [ 1564.619742] __generic_file_write_iter+0x39d/0x5d0 [ 1564.620779] generic_file_write_iter+0xdb/0x230 [ 1564.621738] ? iov_iter_init+0x3c/0x130 [ 1564.622565] new_sync_write+0x42c/0x660 [ 1564.623394] ? new_sync_read+0x6f0/0x6f0 [ 1564.624239] ? __x64_sys_pwrite64+0x201/0x260 [ 1564.625173] ? lock_release+0x680/0x680 [ 1564.626009] ? selinux_file_permission+0x92/0x520 [ 1564.627017] ? security_file_permission+0xb1/0xe0 [ 1564.628022] vfs_write+0x7c0/0xb10 [ 1564.628764] __x64_sys_pwrite64+0x201/0x260 [ 1564.629660] ? ksys_pwrite64+0x1b0/0x1b0 [ 1564.630514] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1564.631594] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1564.632666] do_syscall_64+0x33/0x40 [ 1564.633438] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1564.634499] RIP: 0033:0x7fcc93db7ab7 [ 1564.635266] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1564.639054] RSP: 002b:00007fcc91379f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1564.640633] RAX: ffffffffffffffda RBX: 00007fcc93e4e970 RCX: 00007fcc93db7ab7 [ 1564.642095] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000005 [ 1564.643570] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1564.645039] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000005 [ 1564.646513] R13: 0000000000000005 R14: 00000000200004a0 R15: 0000000000000004 22:03:40 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 1) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1564.657758] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1564.674877] FAULT_INJECTION: forcing a failure. [ 1564.674877] name failslab, interval 1, probability 0, space 0, times 0 [ 1564.677444] CPU: 0 PID: 10098 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1564.678866] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1564.680536] Call Trace: [ 1564.681070] dump_stack+0x107/0x167 [ 1564.681806] should_fail.cold+0x5/0xa [ 1564.682579] ? __do_sys_memfd_create+0xfb/0x450 [ 1564.683522] should_failslab+0x5/0x20 [ 1564.684294] __kmalloc+0x72/0x390 [ 1564.685002] __do_sys_memfd_create+0xfb/0x450 [ 1564.685915] ? ksys_write+0x1a9/0x260 [ 1564.686690] ? memfd_file_seals_ptr+0x170/0x170 [ 1564.687631] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1564.688690] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1564.689749] do_syscall_64+0x33/0x40 [ 1564.690503] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1564.691538] RIP: 0033:0x7f3e51965b19 [ 1564.692287] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1564.696028] RSP: 002b:00007f3e4eedaf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1564.697558] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f3e51965b19 [ 1564.699002] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f3e519bf0fb [ 1564.700437] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1564.701872] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1564.703310] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000140 22:03:40 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af83", 0xcb}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d", 0x62}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:03:40 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) [ 1564.757345] FAULT_INJECTION: forcing a failure. [ 1564.757345] name failslab, interval 1, probability 0, space 0, times 0 [ 1564.759868] CPU: 1 PID: 10103 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1564.761393] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1564.763240] Call Trace: [ 1564.763820] dump_stack+0x107/0x167 [ 1564.764646] should_fail.cold+0x5/0xa [ 1564.765505] ? security_file_alloc+0x34/0x170 [ 1564.766538] ? security_file_alloc+0x34/0x170 [ 1564.767552] should_failslab+0x5/0x20 [ 1564.768406] kmem_cache_alloc+0x5b/0x310 [ 1564.769318] security_file_alloc+0x34/0x170 [ 1564.770272] __alloc_file+0xb7/0x320 [ 1564.771098] alloc_empty_file+0x6d/0x170 [ 1564.772010] alloc_file+0x5e/0x5a0 [ 1564.772813] alloc_file_pseudo+0x16a/0x250 [ 1564.773727] ? alloc_file+0x5a0/0x5a0 [ 1564.774590] anon_inode_getfile+0xc8/0x1f0 [ 1564.775545] io_uring_setup+0x138b/0x2980 [ 1564.776450] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1564.777547] ? wait_for_completion_io+0x270/0x270 [ 1564.778644] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1564.779775] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1564.780901] do_syscall_64+0x33/0x40 [ 1564.781747] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1564.782912] RIP: 0033:0x7fcc97c5ab19 [ 1564.783729] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1564.787746] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1564.789440] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1564.791028] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1564.792604] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1564.794162] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1564.795770] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 22:03:40 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 10) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:03:40 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x5, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:03:40 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:03:40 executing program 6: getpgid(0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x22902, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_io_uring_complete(0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x5d, 0x0, @thr={&(0x7f00000002c0)="c58435b56fadce6925a8c5ef8299d1c9436890996f121c55fd3949c7ffe74e562d5b7ad3ba81ec2ee03296fc177baf9eb677c3b886f2d2f6f15bbb7648f001000000a7e1de93ae4056fd27712f2d24552e5d7d39ec16e048786d22b4989871bad0f0ee169831b6e6f3e5f6aec27d337087b8119f6d755f6e40547c31e63fdaf4b4593725c72c370172c9527216a415009b28cfab12175e4c530e215b70f7b654b1cc73e9eabfb340bcf589b70ae5e8acd00b6770b80a2a135bf9bd68f3679d8a46b4c50a69d29136daef4804fe9cb5f8caceaeb2b7310d7154d547c522215a4a59b9787a63c4e818bd23c5668aa30f9e030613", 0x0}}, &(0x7f0000000180)) r1 = socket$netlink(0x10, 0x3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000080)=""/200, 0x20000148}], 0x1, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000003c0)=""/101, 0x65) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000240), &(0x7f0000000440)={'L-', 0x3}, 0x16, 0x3) 22:03:40 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 18) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1564.874628] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1564.879840] FAULT_INJECTION: forcing a failure. [ 1564.879840] name failslab, interval 1, probability 0, space 0, times 0 [ 1564.882209] CPU: 0 PID: 10116 Comm: syz-executor.7 Not tainted 5.10.230 #1 [ 1564.883492] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1564.884999] Call Trace: [ 1564.885482] dump_stack+0x107/0x167 [ 1564.886151] should_fail.cold+0x5/0xa [ 1564.886866] ? __alloc_file+0x21/0x320 [ 1564.887587] should_failslab+0x5/0x20 [ 1564.888284] kmem_cache_alloc+0x5b/0x310 [ 1564.889046] __alloc_file+0x21/0x320 [ 1564.889724] alloc_empty_file+0x6d/0x170 [ 1564.890473] alloc_file+0x5e/0x5a0 [ 1564.891131] alloc_file_pseudo+0x16a/0x250 [ 1564.891910] ? alloc_file+0x5a0/0x5a0 [ 1564.892617] ? shmem_get_inode+0x55c/0xbc0 [ 1564.893398] __shmem_file_setup+0x144/0x320 [ 1564.894205] ? _copy_from_user+0xfb/0x1b0 [ 1564.894972] __do_sys_memfd_create+0x275/0x450 [ 1564.895811] ? memfd_file_seals_ptr+0x170/0x170 [ 1564.896664] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1564.897620] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1564.898573] do_syscall_64+0x33/0x40 [ 1564.899252] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1564.900189] RIP: 0033:0x7f3576682b19 [ 1564.900879] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1564.904250] RSP: 002b:00007f3573bf7f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1564.905658] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f3576682b19 [ 1564.906966] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f35766dc0fb [ 1564.908254] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1564.909543] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1564.910832] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000140 [ 1564.925613] FAULT_INJECTION: forcing a failure. [ 1564.925613] name failslab, interval 1, probability 0, space 0, times 0 [ 1564.927783] CPU: 0 PID: 10121 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1564.929026] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1564.930525] Call Trace: [ 1564.930997] dump_stack+0x107/0x167 [ 1564.931647] should_fail.cold+0x5/0xa [ 1564.932338] ? create_object.isra.0+0x3a/0xa20 [ 1564.933170] should_failslab+0x5/0x20 [ 1564.933858] kmem_cache_alloc+0x5b/0x310 [ 1564.934592] create_object.isra.0+0x3a/0xa20 [ 1564.935382] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1564.936290] __kmalloc+0x16e/0x390 [ 1564.936942] __do_sys_memfd_create+0xfb/0x450 [ 1564.937750] ? ksys_write+0x1a9/0x260 [ 1564.938444] ? memfd_file_seals_ptr+0x170/0x170 [ 1564.939285] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1564.940218] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1564.941145] do_syscall_64+0x33/0x40 [ 1564.941820] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1564.942731] RIP: 0033:0x7f3e51965b19 [ 1564.943383] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1564.946632] RSP: 002b:00007f3e4eedaf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1564.947969] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f3e51965b19 [ 1564.949226] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f3e519bf0fb [ 1564.950504] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1564.951782] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1564.953039] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000140 [ 1564.966732] FAULT_INJECTION: forcing a failure. [ 1564.966732] name failslab, interval 1, probability 0, space 0, times 0 [ 1564.968941] CPU: 0 PID: 10122 Comm: syz-executor.3 Not tainted 5.10.230 #1 [ 1564.970161] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1564.971629] Call Trace: [ 1564.972094] dump_stack+0x107/0x167 [ 1564.972739] should_fail.cold+0x5/0xa [ 1564.973413] ? xas_alloc+0x336/0x440 [ 1564.974069] should_failslab+0x5/0x20 [ 1564.974752] kmem_cache_alloc+0x5b/0x310 [ 1564.975465] ? trace_hardirqs_on+0x5b/0x180 [ 1564.976229] xas_alloc+0x336/0x440 [ 1564.976854] xas_create+0x60f/0x10d0 [ 1564.977527] xas_create_range+0x189/0x620 [ 1564.978278] shmem_add_to_page_cache+0x760/0x1130 [ 1564.979146] ? shmem_getattr+0x1a0/0x1a0 [ 1564.979871] shmem_getpage_gfp.constprop.0+0x64a/0x1920 [ 1564.980824] ? shmem_unuse_inode+0xf60/0xf60 [ 1564.981590] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1564.982491] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1564.983385] shmem_write_begin+0xf7/0x1d0 [ 1564.984112] generic_perform_write+0x20a/0x4f0 [ 1564.984928] ? page_cache_prev_miss+0x310/0x310 [ 1564.985736] ? evict_inodes+0x470/0x470 [ 1564.986433] ? generic_write_checks+0x2ad/0x390 [ 1564.987252] __generic_file_write_iter+0x39d/0x5d0 [ 1564.988113] generic_file_write_iter+0xdb/0x230 [ 1564.988916] ? iov_iter_init+0x3c/0x130 [ 1564.989607] new_sync_write+0x42c/0x660 [ 1564.990309] ? new_sync_read+0x6f0/0x6f0 [ 1564.991021] ? __x64_sys_pwrite64+0x201/0x260 [ 1564.991811] ? lock_release+0x680/0x680 [ 1564.992501] ? selinux_file_permission+0x92/0x520 [ 1564.993345] ? security_file_permission+0xb1/0xe0 [ 1564.994190] vfs_write+0x7c0/0xb10 [ 1564.994841] __x64_sys_pwrite64+0x201/0x260 [ 1564.995602] ? ksys_pwrite64+0x1b0/0x1b0 [ 1564.996308] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1564.997208] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1564.998100] do_syscall_64+0x33/0x40 [ 1564.998750] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1564.999622] RIP: 0033:0x7fcc93db7ab7 [ 1565.000261] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1565.003425] RSP: 002b:00007fcc91379f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1565.004735] RAX: ffffffffffffffda RBX: 00007fcc93e4e970 RCX: 00007fcc93db7ab7 [ 1565.005955] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000005 [ 1565.007184] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1565.008403] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000005 [ 1565.009613] R13: 0000000000000005 R14: 00000000200004a0 R15: 0000000000000004 [ 1565.110869] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1565.120973] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1580.185820] FAULT_INJECTION: forcing a failure. [ 1580.185820] name failslab, interval 1, probability 0, space 0, times 0 [ 1580.187247] CPU: 0 PID: 10144 Comm: syz-executor.4 Not tainted 5.10.230 #1 [ 1580.188028] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1580.188974] Call Trace: [ 1580.189277] dump_stack+0x107/0x167 [ 1580.189688] should_fail.cold+0x5/0xa [ 1580.189758] FAULT_INJECTION: forcing a failure. [ 1580.189758] name failslab, interval 1, probability 0, space 0, times 0 [ 1580.190117] ? __alloc_file+0x21/0x320 [ 1580.190131] should_failslab+0x5/0x20 [ 1580.190142] kmem_cache_alloc+0x5b/0x310 [ 1580.190159] __alloc_file+0x21/0x320 [ 1580.194240] alloc_empty_file+0x6d/0x170 [ 1580.194712] alloc_file+0x5e/0x5a0 [ 1580.195132] alloc_file_pseudo+0x16a/0x250 [ 1580.195602] ? alloc_file+0x5a0/0x5a0 [ 1580.196042] ? shmem_get_inode+0x55c/0xbc0 [ 1580.196525] __shmem_file_setup+0x144/0x320 [ 1580.197023] ? _copy_from_user+0xfb/0x1b0 [ 1580.197500] __do_sys_memfd_create+0x275/0x450 [ 1580.198025] ? memfd_file_seals_ptr+0x170/0x170 [ 1580.198553] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1580.199162] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1580.199737] do_syscall_64+0x33/0x40 [ 1580.200156] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1580.200729] RIP: 0033:0x7f50ad7e0b19 [ 1580.201149] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1580.203244] RSP: 002b:00007f50aad55f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1580.204106] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f50ad7e0b19 [ 1580.204911] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f50ad83a0fb [ 1580.205717] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1580.206520] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1580.207351] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000140 [ 1580.208183] CPU: 1 PID: 10140 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1580.209645] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1580.211387] Call Trace: [ 1580.211958] dump_stack+0x107/0x167 [ 1580.213023] should_fail.cold+0x5/0xa 22:03:56 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 45) 22:03:56 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x5, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:03:56 executing program 6: getpgid(0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x22902, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_io_uring_complete(0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x5d, 0x0, @thr={&(0x7f00000002c0)="c58435b56fadce6925a8c5ef8299d1c9436890996f121c55fd3949c7ffe74e562d5b7ad3ba81ec2ee03296fc177baf9eb677c3b886f2d2f6f15bbb7648f001000000a7e1de93ae4056fd27712f2d24552e5d7d39ec16e048786d22b4989871bad0f0ee169831b6e6f3e5f6aec27d337087b8119f6d755f6e40547c31e63fdaf4b4593725c72c370172c9527216a415009b28cfab12175e4c530e215b70f7b654b1cc73e9eabfb340bcf589b70ae5e8acd00b6770b80a2a135bf9bd68f3679d8a46b4c50a69d29136daef4804fe9cb5f8caceaeb2b7310d7154d547c522215a4a59b9787a63c4e818bd23c5668aa30f9e030613", 0x0}}, &(0x7f0000000180)) r1 = socket$netlink(0x10, 0x3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000080)=""/200, 0x20000148}], 0x1, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000003c0)=""/101, 0x65) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000240), &(0x7f0000000440)={'L-', 0x3}, 0x16, 0x3) 22:03:56 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 19) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1580.213842] ? create_object.isra.0+0x3a/0xa20 [ 1580.215004] should_failslab+0x5/0x20 [ 1580.215818] kmem_cache_alloc+0x5b/0x310 [ 1580.216643] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1580.217757] create_object.isra.0+0x3a/0xa20 [ 1580.218649] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1580.219705] kmem_cache_alloc+0x159/0x310 [ 1580.220553] security_file_alloc+0x34/0x170 [ 1580.221433] __alloc_file+0xb7/0x320 [ 1580.222193] alloc_empty_file+0x6d/0x170 [ 1580.223029] alloc_file+0x5e/0x5a0 [ 1580.223747] alloc_file_pseudo+0x16a/0x250 [ 1580.224605] ? alloc_file+0x5a0/0x5a0 [ 1580.225402] anon_inode_getfile+0xc8/0x1f0 [ 1580.226261] io_uring_setup+0x138b/0x2980 [ 1580.227132] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1580.228164] ? wait_for_completion_io+0x270/0x270 [ 1580.229167] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1580.230233] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1580.231294] do_syscall_64+0x33/0x40 [ 1580.232050] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1580.233092] RIP: 0033:0x7fcc97c5ab19 [ 1580.233852] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1580.237567] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1580.239123] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 22:03:56 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) 22:03:56 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 10) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:03:56 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 11) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:03:56 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 3) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1580.240567] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1580.242319] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1580.243790] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1580.245239] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1580.259603] FAULT_INJECTION: forcing a failure. [ 1580.259603] name failslab, interval 1, probability 0, space 0, times 0 [ 1580.261247] CPU: 0 PID: 10148 Comm: syz-executor.7 Not tainted 5.10.230 #1 [ 1580.262007] FAULT_INJECTION: forcing a failure. [ 1580.262007] name failslab, interval 1, probability 0, space 0, times 0 [ 1580.263283] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1580.263295] Call Trace: [ 1580.265288] dump_stack+0x107/0x167 [ 1580.265700] should_fail.cold+0x5/0xa [ 1580.266131] ? create_object.isra.0+0x3a/0xa20 [ 1580.266648] should_failslab+0x5/0x20 [ 1580.267097] kmem_cache_alloc+0x5b/0x310 [ 1580.267557] create_object.isra.0+0x3a/0xa20 [ 1580.268051] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1580.268624] kmem_cache_alloc+0x159/0x310 [ 1580.269097] __alloc_file+0x21/0x320 [ 1580.269518] alloc_empty_file+0x6d/0x170 [ 1580.269977] alloc_file+0x5e/0x5a0 [ 1580.270378] alloc_file_pseudo+0x16a/0x250 [ 1580.270869] ? alloc_file+0x5a0/0x5a0 [ 1580.271303] ? shmem_get_inode+0x55c/0xbc0 [ 1580.271786] __shmem_file_setup+0x144/0x320 [ 1580.272277] ? _copy_from_user+0xfb/0x1b0 [ 1580.272747] __do_sys_memfd_create+0x275/0x450 [ 1580.273263] ? memfd_file_seals_ptr+0x170/0x170 [ 1580.273795] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1580.274385] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1580.274988] do_syscall_64+0x33/0x40 [ 1580.275406] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1580.275985] RIP: 0033:0x7f3576682b19 [ 1580.276402] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1580.278483] RSP: 002b:00007f3573bf7f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1580.279359] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f3576682b19 [ 1580.280163] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f35766dc0fb [ 1580.280972] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1580.281775] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1580.282576] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000140 [ 1580.283419] CPU: 1 PID: 10141 Comm: syz-executor.3 Not tainted 5.10.230 #1 [ 1580.284838] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1580.286529] Call Trace: [ 1580.287078] dump_stack+0x107/0x167 [ 1580.287823] should_fail.cold+0x5/0xa [ 1580.288604] ? create_object.isra.0+0x3a/0xa20 [ 1580.289543] should_failslab+0x5/0x20 [ 1580.290325] kmem_cache_alloc+0x5b/0x310 [ 1580.291166] create_object.isra.0+0x3a/0xa20 [ 1580.292068] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1580.293125] kmem_cache_alloc+0x159/0x310 [ 1580.293963] ? trace_hardirqs_on+0x5b/0x180 [ 1580.294871] xas_alloc+0x336/0x440 [ 1580.295594] xas_create+0x60f/0x10d0 [ 1580.296360] xas_create_range+0x189/0x620 [ 1580.297220] shmem_add_to_page_cache+0x760/0x1130 [ 1580.298204] ? shmem_getattr+0x1a0/0x1a0 [ 1580.299070] shmem_getpage_gfp.constprop.0+0x64a/0x1920 [ 1580.300181] ? shmem_unuse_inode+0xf60/0xf60 [ 1580.301083] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1580.302136] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1580.303190] shmem_write_begin+0xf7/0x1d0 [ 1580.304031] generic_perform_write+0x20a/0x4f0 [ 1580.304972] ? page_cache_prev_miss+0x310/0x310 [ 1580.305913] ? evict_inodes+0x470/0x470 [ 1580.306732] ? generic_write_checks+0x2ad/0x390 [ 1580.307701] __generic_file_write_iter+0x39d/0x5d0 [ 1580.308710] generic_file_write_iter+0xdb/0x230 22:03:56 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 11) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) [ 1580.309654] ? iov_iter_init+0x3c/0x130 [ 1580.310622] new_sync_write+0x42c/0x660 [ 1580.311444] ? new_sync_read+0x6f0/0x6f0 [ 1580.312267] ? __x64_sys_pwrite64+0x201/0x260 [ 1580.313183] ? lock_release+0x680/0x680 [ 1580.313997] ? selinux_file_permission+0x92/0x520 [ 1580.314992] ? security_file_permission+0xb1/0xe0 [ 1580.315977] vfs_write+0x7c0/0xb10 [ 1580.316701] __x64_sys_pwrite64+0x201/0x260 [ 1580.317579] ? ksys_pwrite64+0x1b0/0x1b0 [ 1580.318412] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1580.319485] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1580.320539] do_syscall_64+0x33/0x40 [ 1580.321299] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1580.322331] RIP: 0033:0x7fcc93db7ab7 [ 1580.323096] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1580.326817] RSP: 002b:00007fcc91379f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1580.328369] RAX: ffffffffffffffda RBX: 00007fcc93e4e970 RCX: 00007fcc93db7ab7 [ 1580.329828] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000005 [ 1580.331284] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1580.332737] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000005 [ 1580.334194] R13: 0000000000000005 R14: 00000000200004a0 R15: 0000000000000004 [ 1580.345895] FAULT_INJECTION: forcing a failure. [ 1580.345895] name failslab, interval 1, probability 0, space 0, times 0 [ 1580.346317] FAULT_INJECTION: forcing a failure. [ 1580.346317] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1580.347292] CPU: 0 PID: 10152 Comm: syz-executor.4 Not tainted 5.10.230 #1 [ 1580.350373] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1580.351328] Call Trace: [ 1580.351630] dump_stack+0x107/0x167 [ 1580.352041] should_fail.cold+0x5/0xa [ 1580.352473] ? create_object.isra.0+0x3a/0xa20 [ 1580.352995] should_failslab+0x5/0x20 [ 1580.353426] kmem_cache_alloc+0x5b/0x310 [ 1580.353890] create_object.isra.0+0x3a/0xa20 [ 1580.354385] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1580.354970] kmem_cache_alloc+0x159/0x310 [ 1580.355441] __alloc_file+0x21/0x320 [ 1580.355861] alloc_empty_file+0x6d/0x170 [ 1580.356320] alloc_file+0x5e/0x5a0 [ 1580.356725] alloc_file_pseudo+0x16a/0x250 [ 1580.357200] ? alloc_file+0x5a0/0x5a0 [ 1580.357631] ? shmem_get_inode+0x55c/0xbc0 [ 1580.358117] __shmem_file_setup+0x144/0x320 [ 1580.358604] ? _copy_from_user+0xfb/0x1b0 [ 1580.359099] __do_sys_memfd_create+0x275/0x450 [ 1580.359613] ? memfd_file_seals_ptr+0x170/0x170 [ 1580.360145] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1580.360737] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1580.361322] do_syscall_64+0x33/0x40 [ 1580.361741] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1580.362320] RIP: 0033:0x7f50ad7e0b19 [ 1580.362756] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1580.364840] RSP: 002b:00007f50aad55f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1580.365702] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f50ad7e0b19 [ 1580.366505] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f50ad83a0fb [ 1580.367323] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1580.368131] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1580.368935] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000140 [ 1580.369767] CPU: 1 PID: 10154 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1580.371201] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1580.372902] Call Trace: [ 1580.373443] dump_stack+0x107/0x167 [ 1580.374194] should_fail.cold+0x5/0xa [ 1580.374991] _copy_from_user+0x2e/0x1b0 [ 1580.375810] __do_sys_memfd_create+0x16d/0x450 [ 1580.376740] ? memfd_file_seals_ptr+0x170/0x170 [ 1580.377699] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1580.378779] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1580.379839] do_syscall_64+0x33/0x40 [ 1580.380598] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1580.381638] RIP: 0033:0x7f3e51965b19 22:03:56 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) [ 1580.382409] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1580.386356] RSP: 002b:00007f3e4eedaf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1580.387926] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f3e51965b19 [ 1580.389363] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f3e519bf0fb [ 1580.390805] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1580.392253] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1580.393703] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000140 [ 1580.436978] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1580.471867] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1580.509617] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:04:11 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 4) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:04:11 executing program 6: getpgid(0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x22902, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_io_uring_complete(0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x5d, 0x0, @thr={&(0x7f00000002c0)="c58435b56fadce6925a8c5ef8299d1c9436890996f121c55fd3949c7ffe74e562d5b7ad3ba81ec2ee03296fc177baf9eb677c3b886f2d2f6f15bbb7648f001000000a7e1de93ae4056fd27712f2d24552e5d7d39ec16e048786d22b4989871bad0f0ee169831b6e6f3e5f6aec27d337087b8119f6d755f6e40547c31e63fdaf4b4593725c72c370172c9527216a415009b28cfab12175e4c530e215b70f7b654b1cc73e9eabfb340bcf589b70ae5e8acd00b6770b80a2a135bf9bd68f3679d8a46b4c50a69d29136daef4804fe9cb5f8caceaeb2b7310d7154d547c522215a4a59b9787a63c4e818bd23c5668aa30f9e030613", &(0x7f0000000540)}}, &(0x7f0000000180)) r1 = socket$netlink(0x10, 0x3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000080)=""/200, 0x20000148}], 0x1, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000003c0)=""/101, 0x65) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000240), &(0x7f0000000440)={'L-', 0x3}, 0x16, 0x3) [ 1595.359917] FAULT_INJECTION: forcing a failure. [ 1595.359917] name failslab, interval 1, probability 0, space 0, times 0 [ 1595.362675] CPU: 0 PID: 10178 Comm: syz-executor.7 Not tainted 5.10.230 #1 [ 1595.364188] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1595.365980] Call Trace: [ 1595.366551] dump_stack+0x107/0x167 [ 1595.367349] should_fail.cold+0x5/0xa [ 1595.368171] ? security_file_alloc+0x34/0x170 [ 1595.369141] should_failslab+0x5/0x20 [ 1595.369961] kmem_cache_alloc+0x5b/0x310 [ 1595.370840] security_file_alloc+0x34/0x170 [ 1595.371782] __alloc_file+0xb7/0x320 [ 1595.372582] alloc_empty_file+0x6d/0x170 [ 1595.373459] alloc_file+0x5e/0x5a0 [ 1595.374237] alloc_file_pseudo+0x16a/0x250 [ 1595.375145] ? alloc_file+0x5a0/0x5a0 [ 1595.375977] ? shmem_get_inode+0x55c/0xbc0 [ 1595.376903] __shmem_file_setup+0x144/0x320 [ 1595.377826] ? _copy_from_user+0xfb/0x1b0 [ 1595.378716] __do_sys_memfd_create+0x275/0x450 [ 1595.379732] ? memfd_file_seals_ptr+0x170/0x170 [ 1595.380739] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1595.381865] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1595.382974] do_syscall_64+0x33/0x40 [ 1595.383780] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1595.385087] RIP: 0033:0x7f3576682b19 [ 1595.385891] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1595.389861] RSP: 002b:00007f3573bf7f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1595.391499] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f3576682b19 [ 1595.393025] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f35766dc0fb [ 1595.394574] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1595.396123] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1595.397647] FAULT_INJECTION: forcing a failure. [ 1595.397647] name failslab, interval 1, probability 0, space 0, times 0 [ 1595.400393] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000140 [ 1595.402270] CPU: 1 PID: 10180 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1595.403506] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1595.405687] Call Trace: 22:04:11 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 12) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:04:11 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 12) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:04:11 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 46) 22:04:11 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x5, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:04:11 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 20) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:04:11 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) [ 1595.406594] dump_stack+0x107/0x167 [ 1595.407680] should_fail.cold+0x5/0xa [ 1595.408627] ? shmem_alloc_inode+0x18/0x40 [ 1595.409502] should_failslab+0x5/0x20 [ 1595.410287] kmem_cache_alloc+0x5b/0x310 [ 1595.411126] ? shmem_destroy_inode+0x70/0x70 [ 1595.412273] shmem_alloc_inode+0x18/0x40 [ 1595.413167] ? shmem_destroy_inode+0x70/0x70 [ 1595.414292] alloc_inode+0x63/0x240 [ 1595.415248] new_inode+0x23/0x250 [ 1595.415825] FAULT_INJECTION: forcing a failure. [ 1595.415825] name failslab, interval 1, probability 0, space 0, times 0 [ 1595.415988] shmem_get_inode+0x15e/0xbc0 [ 1595.419151] __shmem_file_setup+0xb8/0x320 [ 1595.420035] ? _copy_from_user+0xfb/0x1b0 [ 1595.420893] __do_sys_memfd_create+0x275/0x450 [ 1595.421840] ? memfd_file_seals_ptr+0x170/0x170 [ 1595.422804] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1595.423907] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1595.425253] do_syscall_64+0x33/0x40 [ 1595.426015] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1595.427352] RIP: 0033:0x7f3e51965b19 [ 1595.428189] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1595.432966] RSP: 002b:00007f3e4eedaf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1595.434558] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f3e51965b19 [ 1595.436037] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f3e519bf0fb [ 1595.437501] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1595.438958] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1595.440438] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000140 [ 1595.441924] CPU: 0 PID: 10182 Comm: syz-executor.4 Not tainted 5.10.230 #1 [ 1595.443403] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1595.445145] Call Trace: [ 1595.445707] dump_stack+0x107/0x167 [ 1595.446476] should_fail.cold+0x5/0xa [ 1595.447280] ? security_file_alloc+0x34/0x170 [ 1595.448218] should_failslab+0x5/0x20 [ 1595.449024] kmem_cache_alloc+0x5b/0x310 [ 1595.449882] security_file_alloc+0x34/0x170 [ 1595.450801] __alloc_file+0xb7/0x320 [ 1595.451589] alloc_empty_file+0x6d/0x170 [ 1595.452435] alloc_file+0x5e/0x5a0 [ 1595.453183] alloc_file_pseudo+0x16a/0x250 [ 1595.454069] ? alloc_file+0x5a0/0x5a0 [ 1595.454873] ? shmem_get_inode+0x55c/0xbc0 [ 1595.455778] __shmem_file_setup+0x144/0x320 [ 1595.456687] ? _copy_from_user+0xfb/0x1b0 [ 1595.457557] __do_sys_memfd_create+0x275/0x450 [ 1595.458510] ? memfd_file_seals_ptr+0x170/0x170 [ 1595.459502] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1595.460617] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1595.461690] do_syscall_64+0x33/0x40 [ 1595.462461] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1595.463533] RIP: 0033:0x7f50ad7e0b19 [ 1595.464320] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1595.468183] RSP: 002b:00007f50aad55f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1595.469762] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f50ad7e0b19 [ 1595.471265] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f50ad83a0fb [ 1595.472760] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1595.474256] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1595.475767] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000140 [ 1595.490971] FAULT_INJECTION: forcing a failure. [ 1595.490971] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1595.492771] FAULT_INJECTION: forcing a failure. [ 1595.492771] name failslab, interval 1, probability 0, space 0, times 0 [ 1595.493721] CPU: 1 PID: 10188 Comm: syz-executor.3 Not tainted 5.10.230 #1 [ 1595.497132] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1595.498815] Call Trace: [ 1595.499370] dump_stack+0x107/0x167 [ 1595.500128] should_fail.cold+0x5/0xa [ 1595.500919] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 1595.502026] ? shmem_write_begin+0xf7/0x1d0 [ 1595.502913] ? shmem_write_begin+0x100/0x1d0 [ 1595.503835] generic_perform_write+0x279/0x4f0 [ 1595.504779] ? page_cache_prev_miss+0x310/0x310 [ 1595.505980] ? evict_inodes+0x470/0x470 [ 1595.506872] ? generic_write_checks+0x2ad/0x390 [ 1595.508070] __generic_file_write_iter+0x39d/0x5d0 [ 1595.509155] generic_file_write_iter+0xdb/0x230 [ 1595.510329] ? iov_iter_init+0x3c/0x130 [ 1595.511378] new_sync_write+0x42c/0x660 [ 1595.512268] ? new_sync_read+0x6f0/0x6f0 [ 1595.513314] ? __x64_sys_pwrite64+0x201/0x260 [ 1595.514241] ? lock_release+0x680/0x680 [ 1595.515063] ? selinux_file_permission+0x92/0x520 [ 1595.516073] ? security_file_permission+0xb1/0xe0 [ 1595.517069] vfs_write+0x7c0/0xb10 [ 1595.517813] __x64_sys_pwrite64+0x201/0x260 [ 1595.518930] ? ksys_pwrite64+0x1b0/0x1b0 [ 1595.519855] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1595.520933] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1595.521993] do_syscall_64+0x33/0x40 [ 1595.522763] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1595.524095] RIP: 0033:0x7fcc93db7ab7 [ 1595.524869] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1595.528625] RSP: 002b:00007fcc91379f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1595.530185] RAX: ffffffffffffffda RBX: 00007fcc93e4e970 RCX: 00007fcc93db7ab7 [ 1595.531647] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000005 [ 1595.533108] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1595.534577] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000005 [ 1595.536048] R13: 0000000000000005 R14: 00000000200004a0 R15: 0000000000000004 [ 1595.537544] CPU: 0 PID: 10190 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1595.539021] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1595.540761] Call Trace: [ 1595.541315] dump_stack+0x107/0x167 [ 1595.542072] should_fail.cold+0x5/0xa [ 1595.542881] ? io_uring_alloc_task_context+0x99/0x6a0 [ 1595.543963] should_failslab+0x5/0x20 [ 1595.544765] kmem_cache_alloc_trace+0x55/0x320 [ 1595.545718] io_uring_alloc_task_context+0x99/0x6a0 [ 1595.546759] ? io_import_iovec+0x1120/0x1120 [ 1595.547692] ? lock_downgrade+0x6d0/0x6d0 [ 1595.548550] ? do_raw_spin_lock+0x121/0x260 [ 1595.549441] ? rwlock_bug.part.0+0x90/0x90 [ 1595.550344] __io_uring_add_tctx_node+0x2c6/0x520 [ 1595.551413] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1595.552518] ? alloc_fd+0x2e7/0x670 [ 1595.553295] io_uring_setup+0x1fbb/0x2980 [ 1595.554173] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1595.555467] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1595.556573] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1595.557649] do_syscall_64+0x33/0x40 [ 1595.558422] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1595.559510] RIP: 0033:0x7fcc97c5ab19 [ 1595.560302] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1595.564160] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1595.565757] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 22:04:11 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 13) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:04:11 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {0x0}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1595.565797] FAULT_INJECTION: forcing a failure. [ 1595.565797] name failslab, interval 1, probability 0, space 0, times 0 [ 1595.567268] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1595.567279] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1595.567289] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1595.567300] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1595.576540] CPU: 1 PID: 10194 Comm: syz-executor.7 Not tainted 5.10.230 #1 [ 1595.578166] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1595.579890] Call Trace: [ 1595.580442] dump_stack+0x107/0x167 [ 1595.581192] should_fail.cold+0x5/0xa [ 1595.581959] ? create_object.isra.0+0x3a/0xa20 [ 1595.582899] should_failslab+0x5/0x20 [ 1595.583681] kmem_cache_alloc+0x5b/0x310 [ 1595.584516] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1595.585644] create_object.isra.0+0x3a/0xa20 [ 1595.586546] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1595.587589] kmem_cache_alloc+0x159/0x310 [ 1595.588429] security_file_alloc+0x34/0x170 [ 1595.589322] __alloc_file+0xb7/0x320 [ 1595.590087] alloc_empty_file+0x6d/0x170 [ 1595.590916] alloc_file+0x5e/0x5a0 [ 1595.591653] alloc_file_pseudo+0x16a/0x250 [ 1595.592507] ? alloc_file+0x5a0/0x5a0 [ 1595.593300] ? shmem_get_inode+0x55c/0xbc0 [ 1595.594161] __shmem_file_setup+0x144/0x320 [ 1595.595049] ? _copy_from_user+0xfb/0x1b0 [ 1595.595912] __do_sys_memfd_create+0x275/0x450 [ 1595.596834] ? memfd_file_seals_ptr+0x170/0x170 [ 1595.597773] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1595.598831] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1595.599890] do_syscall_64+0x33/0x40 [ 1595.600637] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1595.601671] RIP: 0033:0x7f3576682b19 [ 1595.602426] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1595.606168] RSP: 002b:00007f3573bf7f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1595.607719] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f3576682b19 [ 1595.609168] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f35766dc0fb [ 1595.610608] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1595.612057] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1595.613512] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000140 22:04:11 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 5) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:04:11 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {0x0}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1595.709829] FAULT_INJECTION: forcing a failure. [ 1595.709829] name failslab, interval 1, probability 0, space 0, times 0 [ 1595.713126] CPU: 0 PID: 10202 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1595.714967] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1595.717043] Call Trace: [ 1595.717704] dump_stack+0x107/0x167 [ 1595.718611] should_fail.cold+0x5/0xa [ 1595.719572] ? create_object.isra.0+0x3a/0xa20 [ 1595.720715] should_failslab+0x5/0x20 [ 1595.721675] kmem_cache_alloc+0x5b/0x310 [ 1595.722688] create_object.isra.0+0x3a/0xa20 [ 1595.723783] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1595.725070] kmem_cache_alloc+0x159/0x310 [ 1595.726103] ? shmem_destroy_inode+0x70/0x70 [ 1595.727182] shmem_alloc_inode+0x18/0x40 [ 1595.728186] ? shmem_destroy_inode+0x70/0x70 [ 1595.729260] alloc_inode+0x63/0x240 [ 1595.730156] new_inode+0x23/0x250 [ 1595.731013] shmem_get_inode+0x15e/0xbc0 [ 1595.732045] __shmem_file_setup+0xb8/0x320 [ 1595.733089] ? _copy_from_user+0xfb/0x1b0 [ 1595.734111] __do_sys_memfd_create+0x275/0x450 [ 1595.735250] ? memfd_file_seals_ptr+0x170/0x170 [ 1595.736409] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1595.737693] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1595.738962] do_syscall_64+0x33/0x40 [ 1595.739884] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1595.741143] RIP: 0033:0x7f3e51965b19 [ 1595.742062] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1595.746592] RSP: 002b:00007f3e4eedaf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1595.748496] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f3e51965b19 [ 1595.750259] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f3e519bf0fb [ 1595.752015] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1595.753760] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1595.755521] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000140 22:04:11 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) 22:04:11 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {0x0}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1595.826751] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1595.832656] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1595.856296] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:04:11 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 13) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:04:11 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 47) 22:04:11 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 6) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1595.927513] FAULT_INJECTION: forcing a failure. [ 1595.927513] name failslab, interval 1, probability 0, space 0, times 0 [ 1595.930065] CPU: 1 PID: 10218 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1595.931522] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1595.933233] Call Trace: [ 1595.933803] dump_stack+0x107/0x167 [ 1595.934586] should_fail.cold+0x5/0xa [ 1595.935413] ? io_uring_alloc_task_context+0x99/0x6a0 [ 1595.936480] should_failslab+0x5/0x20 [ 1595.937270] kmem_cache_alloc_trace+0x55/0x320 [ 1595.938240] io_uring_alloc_task_context+0x99/0x6a0 [ 1595.939293] ? io_import_iovec+0x1120/0x1120 [ 1595.940220] ? lock_downgrade+0x6d0/0x6d0 [ 1595.941070] ? do_raw_spin_lock+0x121/0x260 [ 1595.941966] ? rwlock_bug.part.0+0x90/0x90 [ 1595.943060] __io_uring_add_tctx_node+0x2c6/0x520 [ 1595.944069] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1595.945176] ? alloc_fd+0x2e7/0x670 [ 1595.945944] io_uring_setup+0x1fbb/0x2980 [ 1595.946814] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1595.947884] ? wait_for_completion_io+0x270/0x270 [ 1595.948889] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1595.949965] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1595.951043] do_syscall_64+0x33/0x40 [ 1595.951826] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1595.952887] RIP: 0033:0x7fcc97c5ab19 [ 1595.953661] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1595.957449] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1595.959024] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1595.960507] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1595.961965] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1595.963440] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1595.964906] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1596.014853] FAULT_INJECTION: forcing a failure. [ 1596.014853] name failslab, interval 1, probability 0, space 0, times 0 [ 1596.017520] CPU: 1 PID: 10223 Comm: syz-executor.4 Not tainted 5.10.230 #1 [ 1596.018950] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1596.020655] Call Trace: [ 1596.021208] dump_stack+0x107/0x167 [ 1596.021963] should_fail.cold+0x5/0xa [ 1596.022741] ? create_object.isra.0+0x3a/0xa20 [ 1596.023704] should_failslab+0x5/0x20 [ 1596.024484] kmem_cache_alloc+0x5b/0x310 [ 1596.025316] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1596.026444] create_object.isra.0+0x3a/0xa20 [ 1596.027378] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1596.028431] kmem_cache_alloc+0x159/0x310 [ 1596.029286] security_file_alloc+0x34/0x170 [ 1596.030174] __alloc_file+0xb7/0x320 [ 1596.030944] alloc_empty_file+0x6d/0x170 [ 1596.031798] alloc_file+0x5e/0x5a0 [ 1596.032533] alloc_file_pseudo+0x16a/0x250 [ 1596.033407] ? alloc_file+0x5a0/0x5a0 [ 1596.034203] ? shmem_get_inode+0x55c/0xbc0 [ 1596.035077] __shmem_file_setup+0x144/0x320 [ 1596.035984] ? _copy_from_user+0xfb/0x1b0 [ 1596.036839] __do_sys_memfd_create+0x275/0x450 [ 1596.037780] ? memfd_file_seals_ptr+0x170/0x170 [ 1596.038745] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1596.039847] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1596.040910] do_syscall_64+0x33/0x40 [ 1596.041685] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1596.042740] RIP: 0033:0x7f50ad7e0b19 [ 1596.043526] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1596.047324] RSP: 002b:00007f50aad55f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1596.049273] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f50ad7e0b19 [ 1596.051115] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f50ad83a0fb [ 1596.052980] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1596.054815] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1596.056683] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000140 22:04:11 executing program 6: getpgid(0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x22902, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_io_uring_complete(0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x5d, 0x0, @thr={&(0x7f00000002c0)="c58435b56fadce6925a8c5ef8299d1c9436890996f121c55fd3949c7ffe74e562d5b7ad3ba81ec2ee03296fc177baf9eb677c3b886f2d2f6f15bbb7648f001000000a7e1de93ae4056fd27712f2d24552e5d7d39ec16e048786d22b4989871bad0f0ee169831b6e6f3e5f6aec27d337087b8119f6d755f6e40547c31e63fdaf4b4593725c72c370172c9527216a415009b28cfab12175e4c530e215b70f7b654b1cc73e9eabfb340bcf589b70ae5e8acd00b6770b80a2a135bf9bd68f3679d8a46b4c50a69d29136daef4804fe9cb5f8caceaeb2b7310d7154d547c522215a4a59b9787a63c4e818bd23c5668aa30f9e030613", &(0x7f0000000540)}}, &(0x7f0000000180)) r1 = socket$netlink(0x10, 0x3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000080)=""/200, 0x20000148}], 0x1, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000003c0)=""/101, 0x65) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000240), &(0x7f0000000440)={'L-', 0x3}, 0x16, 0x3) 22:04:11 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 14) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:04:12 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 21) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1596.105917] FAULT_INJECTION: forcing a failure. [ 1596.105917] name failslab, interval 1, probability 0, space 0, times 0 [ 1596.108706] CPU: 1 PID: 10226 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1596.110115] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1596.111808] Call Trace: [ 1596.112352] dump_stack+0x107/0x167 [ 1596.113102] should_fail.cold+0x5/0xa [ 1596.113890] ? security_inode_alloc+0x34/0x160 [ 1596.114829] should_failslab+0x5/0x20 [ 1596.115625] kmem_cache_alloc+0x5b/0x310 [ 1596.116471] security_inode_alloc+0x34/0x160 [ 1596.117376] inode_init_always+0xa4e/0xd10 [ 1596.118247] ? shmem_destroy_inode+0x70/0x70 [ 1596.119149] alloc_inode+0x84/0x240 [ 1596.119905] new_inode+0x23/0x250 [ 1596.120630] shmem_get_inode+0x15e/0xbc0 [ 1596.121481] __shmem_file_setup+0xb8/0x320 [ 1596.122353] ? _copy_from_user+0xfb/0x1b0 [ 1596.123206] __do_sys_memfd_create+0x275/0x450 [ 1596.124162] ? memfd_file_seals_ptr+0x170/0x170 [ 1596.125123] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1596.126200] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1596.127266] do_syscall_64+0x33/0x40 [ 1596.128042] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1596.129090] RIP: 0033:0x7f3e51965b19 [ 1596.129863] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1596.133624] RSP: 002b:00007f3e4eedaf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1596.135180] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f3e51965b19 [ 1596.136659] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f3e519bf0fb [ 1596.138115] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1596.139596] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1596.141056] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000140 22:04:12 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 48) 22:04:12 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) [ 1596.216730] FAULT_INJECTION: forcing a failure. [ 1596.216730] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1596.219513] CPU: 0 PID: 10230 Comm: syz-executor.7 Not tainted 5.10.230 #1 [ 1596.220975] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1596.222732] Call Trace: [ 1596.223297] dump_stack+0x107/0x167 [ 1596.224062] should_fail.cold+0x5/0xa [ 1596.224871] __alloc_pages_nodemask+0x182/0x600 [ 1596.225853] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1596.227110] ? lock_downgrade+0x6d0/0x6d0 [ 1596.227988] ? lock_acquire+0x197/0x470 [ 1596.228839] alloc_pages_vma+0xbb/0x410 [ 1596.229677] shmem_alloc_page+0x10f/0x1e0 [ 1596.230550] ? shmem_init_inode+0x20/0x20 [ 1596.231453] ? percpu_counter_add_batch+0x8b/0x140 [ 1596.232481] ? __vm_enough_memory+0x184/0x360 [ 1596.233437] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 1596.234567] ? shmem_unuse_inode+0xf60/0xf60 [ 1596.235498] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1596.236586] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1596.237658] shmem_write_begin+0xf7/0x1d0 [ 1596.238541] generic_perform_write+0x20a/0x4f0 [ 1596.239519] ? page_cache_prev_miss+0x310/0x310 [ 1596.240501] ? evict_inodes+0x470/0x470 [ 1596.241337] ? generic_write_checks+0x2ad/0x390 [ 1596.242318] __generic_file_write_iter+0x39d/0x5d0 [ 1596.243365] generic_file_write_iter+0xdb/0x230 [ 1596.244334] ? iov_iter_init+0x3c/0x130 [ 1596.245174] new_sync_write+0x42c/0x660 [ 1596.246007] ? new_sync_read+0x6f0/0x6f0 [ 1596.246871] ? __x64_sys_pwrite64+0x201/0x260 [ 1596.247821] ? lock_release+0x680/0x680 [ 1596.248655] ? selinux_file_permission+0x92/0x520 [ 1596.249670] ? security_file_permission+0xb1/0xe0 [ 1596.250690] vfs_write+0x7c0/0xb10 [ 1596.251454] __x64_sys_pwrite64+0x201/0x260 [ 1596.252359] ? ksys_pwrite64+0x1b0/0x1b0 [ 1596.253220] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1596.254318] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1596.255408] do_syscall_64+0x33/0x40 [ 1596.256187] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1596.257262] RIP: 0033:0x7f3576635ab7 [ 1596.258046] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1596.261910] RSP: 002b:00007f3573bf7f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1596.263517] RAX: ffffffffffffffda RBX: 00007f35766cc970 RCX: 00007f3576635ab7 [ 1596.265017] RDX: 000000000000005a RSI: 0000000020000540 RDI: 0000000000000005 [ 1596.266525] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1596.268039] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000005 [ 1596.269547] R13: 0000000000000005 R14: 0000000020000440 R15: 0000000000000000 [ 1596.305616] FAULT_INJECTION: forcing a failure. [ 1596.305616] name failslab, interval 1, probability 0, space 0, times 0 [ 1596.308069] CPU: 1 PID: 10238 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1596.309505] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1596.311224] Call Trace: [ 1596.311811] dump_stack+0x107/0x167 [ 1596.312582] should_fail.cold+0x5/0xa [ 1596.313383] ? io_uring_alloc_task_context+0x99/0x6a0 [ 1596.314458] should_failslab+0x5/0x20 [ 1596.315263] kmem_cache_alloc_trace+0x55/0x320 [ 1596.316206] io_uring_alloc_task_context+0x99/0x6a0 [ 1596.317234] ? io_import_iovec+0x1120/0x1120 [ 1596.318151] ? lock_downgrade+0x6d0/0x6d0 [ 1596.319003] ? do_raw_spin_lock+0x121/0x260 [ 1596.319902] ? rwlock_bug.part.0+0x90/0x90 [ 1596.320776] __io_uring_add_tctx_node+0x2c6/0x520 [ 1596.321772] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1596.322850] ? alloc_fd+0x2e7/0x670 [ 1596.323625] io_uring_setup+0x1fbb/0x2980 [ 1596.324483] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1596.325530] ? wait_for_completion_io+0x270/0x270 [ 1596.326541] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1596.327637] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1596.328698] do_syscall_64+0x33/0x40 [ 1596.329465] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1596.330508] RIP: 0033:0x7fcc97c5ab19 [ 1596.331297] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1596.335052] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1596.336620] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1596.338088] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1596.339566] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1596.341026] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1596.342498] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1596.353607] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1596.476722] FAULT_INJECTION: forcing a failure. [ 1596.476722] name failslab, interval 1, probability 0, space 0, times 0 [ 1596.479292] CPU: 1 PID: 10244 Comm: syz-executor.3 Not tainted 5.10.230 #1 [ 1596.480723] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1596.482428] Call Trace: [ 1596.482980] dump_stack+0x107/0x167 [ 1596.483738] should_fail.cold+0x5/0xa [ 1596.484520] ? getname_flags.part.0+0x50/0x4f0 [ 1596.485471] should_failslab+0x5/0x20 [ 1596.486264] kmem_cache_alloc+0x5b/0x310 [ 1596.487105] ? new_sync_write+0x499/0x660 [ 1596.487978] getname_flags.part.0+0x50/0x4f0 [ 1596.488889] getname+0x8e/0xd0 [ 1596.489549] do_sys_openat2+0xf9/0x4d0 [ 1596.490353] ? build_open_flags+0x6f0/0x6f0 [ 1596.491264] ? rcu_read_lock_any_held+0x75/0xa0 [ 1596.492229] __x64_sys_openat+0x13f/0x1f0 [ 1596.493079] ? __ia32_sys_open+0x1c0/0x1c0 [ 1596.493964] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1596.495046] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1596.496112] do_syscall_64+0x33/0x40 [ 1596.496882] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1596.497942] RIP: 0033:0x7fcc93db7a04 [ 1596.498724] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1596.502497] RSP: 002b:00007fcc91379ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1596.504097] RAX: ffffffffffffffda RBX: 00007fcc93e4e970 RCX: 00007fcc93db7a04 [ 1596.505568] RDX: 0000000000000002 RSI: 00007fcc9137a000 RDI: 00000000ffffff9c [ 1596.507038] RBP: 00007fcc9137a000 R08: 0000000000000000 R09: ffffffffffffffff [ 1596.508528] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1596.509978] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 22:04:26 executing program 6: getpgid(0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x22902, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_io_uring_complete(0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x5d, 0x0, @thr={&(0x7f00000002c0)="c58435b56fadce6925a8c5ef8299d1c9436890996f121c55fd3949c7ffe74e562d5b7ad3ba81ec2ee03296fc177baf9eb677c3b886f2d2f6f15bbb7648f001000000a7e1de93ae4056fd27712f2d24552e5d7d39ec16e048786d22b4989871bad0f0ee169831b6e6f3e5f6aec27d337087b8119f6d755f6e40547c31e63fdaf4b4593725c72c370172c9527216a415009b28cfab12175e4c530e215b70f7b654b1cc73e9eabfb340bcf589b70ae5e8acd00b6770b80a2a135bf9bd68f3679d8a46b4c50a69d29136daef4804fe9cb5f8caceaeb2b7310d7154d547c522215a4a59b9787a63c4e818bd23c5668aa30f9e030613", &(0x7f0000000540)}}, &(0x7f0000000180)) r1 = socket$netlink(0x10, 0x3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000080)=""/200, 0x20000148}], 0x1, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000003c0)=""/101, 0x65) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000240), &(0x7f0000000440)={'L-', 0x3}, 0x16, 0x3) 22:04:26 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:04:26 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 22) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:04:26 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 14) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:04:26 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 7) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1610.971561] FAULT_INJECTION: forcing a failure. [ 1610.971561] name failslab, interval 1, probability 0, space 0, times 0 [ 1610.974795] CPU: 1 PID: 10255 Comm: syz-executor.3 Not tainted 5.10.230 #1 [ 1610.976541] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1610.978656] Call Trace: [ 1610.979333] dump_stack+0x107/0x167 [ 1610.980262] should_fail.cold+0x5/0xa [ 1610.981219] ? create_object.isra.0+0x3a/0xa20 [ 1610.982375] should_failslab+0x5/0x20 [ 1610.983333] kmem_cache_alloc+0x5b/0x310 [ 1610.984359] ? __generic_file_write_iter+0x1a4/0x5d0 [ 1610.985628] create_object.isra.0+0x3a/0xa20 [ 1610.986730] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1610.988054] kmem_cache_alloc+0x159/0x310 [ 1610.989093] ? new_sync_write+0x499/0x660 [ 1610.990134] getname_flags.part.0+0x50/0x4f0 [ 1610.991249] getname+0x8e/0xd0 [ 1610.992059] do_sys_openat2+0xf9/0x4d0 [ 1610.993032] ? build_open_flags+0x6f0/0x6f0 [ 1610.994129] ? rcu_read_lock_any_held+0x75/0xa0 [ 1610.995300] __x64_sys_openat+0x13f/0x1f0 [ 1610.996354] ? __ia32_sys_open+0x1c0/0x1c0 [ 1610.997263] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1610.998378] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1610.999459] do_syscall_64+0x33/0x40 [ 1611.000251] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1611.001322] RIP: 0033:0x7fcc93db7a04 [ 1611.002101] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1611.005953] RSP: 002b:00007fcc91379ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1611.007547] RAX: ffffffffffffffda RBX: 00007fcc93e4e970 RCX: 00007fcc93db7a04 [ 1611.009048] RDX: 0000000000000002 RSI: 00007fcc9137a000 RDI: 00000000ffffff9c [ 1611.010543] RBP: 00007fcc9137a000 R08: 0000000000000000 R09: ffffffffffffffff [ 1611.012054] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1611.013551] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1611.017764] FAULT_INJECTION: forcing a failure. [ 1611.017764] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1611.020480] CPU: 0 PID: 10260 Comm: syz-executor.4 Not tainted 5.10.230 #1 [ 1611.021809] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1611.023420] Call Trace: [ 1611.023945] dump_stack+0x107/0x167 [ 1611.024652] should_fail.cold+0x5/0xa [ 1611.025386] __alloc_pages_nodemask+0x182/0x600 [ 1611.026274] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1611.027426] ? lock_downgrade+0x6d0/0x6d0 [ 1611.028223] ? lock_acquire+0x197/0x470 [ 1611.029004] alloc_pages_vma+0xbb/0x410 [ 1611.029775] shmem_alloc_page+0x10f/0x1e0 [ 1611.030578] ? shmem_init_inode+0x20/0x20 [ 1611.030979] FAULT_INJECTION: forcing a failure. [ 1611.030979] name failslab, interval 1, probability 0, space 0, times 0 [ 1611.031405] ? percpu_counter_add_batch+0x8b/0x140 [ 1611.034950] ? __vm_enough_memory+0x184/0x360 [ 1611.035838] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 1611.036880] ? shmem_unuse_inode+0xf60/0xf60 [ 1611.037725] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1611.038712] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1611.039691] shmem_write_begin+0xf7/0x1d0 [ 1611.040498] generic_perform_write+0x20a/0x4f0 [ 1611.041381] ? page_cache_prev_miss+0x310/0x310 [ 1611.042270] ? evict_inodes+0x470/0x470 [ 1611.043028] ? generic_write_checks+0x2ad/0x390 [ 1611.043922] __generic_file_write_iter+0x39d/0x5d0 [ 1611.044863] generic_file_write_iter+0xdb/0x230 [ 1611.045740] ? iov_iter_init+0x3c/0x130 [ 1611.046507] new_sync_write+0x42c/0x660 [ 1611.047277] ? new_sync_read+0x6f0/0x6f0 [ 1611.048062] ? __x64_sys_pwrite64+0x201/0x260 [ 1611.048921] ? lock_release+0x680/0x680 [ 1611.049683] ? selinux_file_permission+0x92/0x520 [ 1611.050616] ? security_file_permission+0xb1/0xe0 [ 1611.051548] vfs_write+0x7c0/0xb10 [ 1611.052247] __x64_sys_pwrite64+0x201/0x260 [ 1611.053066] ? ksys_pwrite64+0x1b0/0x1b0 [ 1611.053832] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1611.054841] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1611.055833] do_syscall_64+0x33/0x40 [ 1611.056543] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1611.057517] RIP: 0033:0x7f50ad793ab7 [ 1611.058226] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1611.061690] RSP: 002b:00007f50aad55f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1611.063126] RAX: ffffffffffffffda RBX: 00007f50ad82a970 RCX: 00007f50ad793ab7 [ 1611.064479] RDX: 000000000000005a RSI: 0000000020000540 RDI: 0000000000000005 [ 1611.065823] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1611.067171] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000005 [ 1611.068528] R13: 0000000000000005 R14: 0000000020000440 R15: 0000000000000000 22:04:26 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) 22:04:26 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 49) 22:04:26 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 15) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1611.069917] CPU: 1 PID: 10263 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1611.071813] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1611.072777] FAULT_INJECTION: forcing a failure. [ 1611.072777] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1611.073554] Call Trace: [ 1611.073581] dump_stack+0x107/0x167 [ 1611.073601] should_fail.cold+0x5/0xa [ 1611.073621] ? create_object.isra.0+0x3a/0xa20 [ 1611.073642] should_failslab+0x5/0x20 [ 1611.073659] kmem_cache_alloc+0x5b/0x310 [ 1611.073682] create_object.isra.0+0x3a/0xa20 [ 1611.073697] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1611.073720] kmem_cache_alloc+0x159/0x310 [ 1611.073752] security_inode_alloc+0x34/0x160 [ 1611.086245] inode_init_always+0xa4e/0xd10 [ 1611.087135] ? shmem_destroy_inode+0x70/0x70 [ 1611.088301] alloc_inode+0x84/0x240 [ 1611.089253] new_inode+0x23/0x250 [ 1611.090166] shmem_get_inode+0x15e/0xbc0 [ 1611.091245] __shmem_file_setup+0xb8/0x320 [ 1611.092354] ? _copy_from_user+0xfb/0x1b0 [ 1611.093434] __do_sys_memfd_create+0x275/0x450 [ 1611.094604] ? memfd_file_seals_ptr+0x170/0x170 [ 1611.095840] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1611.097215] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1611.098563] do_syscall_64+0x33/0x40 [ 1611.099530] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1611.100890] RIP: 0033:0x7f3e51965b19 [ 1611.101867] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1611.106656] RSP: 002b:00007f3e4eedaf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1611.108670] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f3e51965b19 [ 1611.110528] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f3e519bf0fb [ 1611.112391] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1611.114262] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1611.116133] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000140 [ 1611.118083] CPU: 0 PID: 10262 Comm: syz-executor.7 Not tainted 5.10.230 #1 [ 1611.119378] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1611.120925] Call Trace: [ 1611.121419] dump_stack+0x107/0x167 [ 1611.122090] should_fail.cold+0x5/0xa [ 1611.122786] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 1611.123787] ? shmem_write_begin+0xf7/0x1d0 [ 1611.124571] ? shmem_write_begin+0x100/0x1d0 [ 1611.125388] generic_perform_write+0x279/0x4f0 [ 1611.126239] ? page_cache_prev_miss+0x310/0x310 [ 1611.127085] ? evict_inodes+0x470/0x470 [ 1611.127817] ? generic_write_checks+0x2ad/0x390 [ 1611.128890] __generic_file_write_iter+0x39d/0x5d0 [ 1611.129796] generic_file_write_iter+0xdb/0x230 [ 1611.130639] ? iov_iter_init+0x3c/0x130 [ 1611.131371] new_sync_write+0x42c/0x660 [ 1611.132111] ? new_sync_read+0x6f0/0x6f0 [ 1611.132845] ? __x64_sys_pwrite64+0x201/0x260 [ 1611.133672] ? lock_release+0x680/0x680 [ 1611.134385] ? selinux_file_permission+0x92/0x520 [ 1611.135264] ? security_file_permission+0xb1/0xe0 [ 1611.136163] vfs_write+0x7c0/0xb10 [ 1611.136818] __x64_sys_pwrite64+0x201/0x260 [ 1611.137610] ? ksys_pwrite64+0x1b0/0x1b0 [ 1611.138352] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1611.139310] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1611.140256] do_syscall_64+0x33/0x40 [ 1611.140945] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1611.141875] RIP: 0033:0x7f3576635ab7 [ 1611.142550] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1611.145932] RSP: 002b:00007f3573bf7f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1611.147322] RAX: ffffffffffffffda RBX: 00007f35766cc970 RCX: 00007f3576635ab7 [ 1611.148645] RDX: 000000000000005a RSI: 0000000020000540 RDI: 0000000000000005 [ 1611.149934] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1611.151223] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000005 [ 1611.152518] R13: 0000000000000005 R14: 0000000020000440 R15: 0000000000000000 22:04:27 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1611.198902] FAULT_INJECTION: forcing a failure. [ 1611.198902] name failslab, interval 1, probability 0, space 0, times 0 [ 1611.201417] CPU: 1 PID: 10261 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1611.202883] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1611.204644] Call Trace: [ 1611.205209] dump_stack+0x107/0x167 [ 1611.205981] should_fail.cold+0x5/0xa [ 1611.206794] ? create_object.isra.0+0x3a/0xa20 [ 1611.207769] should_failslab+0x5/0x20 [ 1611.208592] kmem_cache_alloc+0x5b/0x310 [ 1611.209462] create_object.isra.0+0x3a/0xa20 [ 1611.210404] kmemleak_alloc_percpu+0xa0/0x100 [ 1611.211359] pcpu_alloc+0x4e2/0x1240 [ 1611.212185] __percpu_counter_init+0x10d/0x2d0 [ 1611.213160] io_uring_alloc_task_context+0xcc/0x6a0 [ 1611.214230] ? io_import_iovec+0x1120/0x1120 [ 1611.215177] ? lock_downgrade+0x6d0/0x6d0 [ 1611.216140] ? do_raw_spin_lock+0x121/0x260 [ 1611.217138] ? rwlock_bug.part.0+0x90/0x90 [ 1611.218045] __io_uring_add_tctx_node+0x2c6/0x520 [ 1611.219069] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1611.220185] ? alloc_fd+0x2e7/0x670 [ 1611.220976] io_uring_setup+0x1fbb/0x2980 [ 1611.221857] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1611.222932] ? wait_for_completion_io+0x270/0x270 [ 1611.223984] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1611.225092] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1611.226176] do_syscall_64+0x33/0x40 [ 1611.226976] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1611.228059] RIP: 0033:0x7fcc97c5ab19 [ 1611.228857] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1611.232702] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1611.234305] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1611.235804] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1611.237296] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1611.238797] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1611.240306] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1611.286834] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 22:04:27 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 50) 22:04:27 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) 22:04:27 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 15) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) [ 1611.340906] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1611.344276] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1611.356774] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1611.432748] FAULT_INJECTION: forcing a failure. [ 1611.432748] name failslab, interval 1, probability 0, space 0, times 0 [ 1611.432990] FAULT_INJECTION: forcing a failure. [ 1611.432990] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1611.434460] CPU: 0 PID: 10292 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1611.434468] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1611.434472] Call Trace: [ 1611.434489] dump_stack+0x107/0x167 [ 1611.434503] should_fail.cold+0x5/0xa [ 1611.434517] ? io_wq_create+0xeb/0xc00 [ 1611.434532] should_failslab+0x5/0x20 [ 1611.434544] __kmalloc+0x72/0x390 [ 1611.434561] io_wq_create+0xeb/0xc00 [ 1611.434580] io_uring_alloc_task_context+0x1f1/0x6a0 [ 1611.434599] ? io_import_iovec+0x1120/0x1120 [ 1611.444154] ? io_apoll_task_func+0x2d0/0x2d0 [ 1611.444789] ? __io_req_find_next+0x300/0x300 [ 1611.445424] ? do_raw_spin_lock+0x121/0x260 [ 1611.446034] ? rwlock_bug.part.0+0x90/0x90 [ 1611.446639] __io_uring_add_tctx_node+0x2c6/0x520 [ 1611.447333] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1611.448122] ? alloc_fd+0x2e7/0x670 [ 1611.448645] io_uring_setup+0x1fbb/0x2980 [ 1611.449244] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1611.449960] ? wait_for_completion_io+0x270/0x270 [ 1611.450660] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1611.451406] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1611.452144] do_syscall_64+0x33/0x40 [ 1611.452673] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1611.453403] RIP: 0033:0x7fcc97c5ab19 [ 1611.453930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1611.456734] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1611.457871] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1611.458925] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1611.459978] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1611.461027] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1611.462070] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1611.463154] CPU: 1 PID: 10291 Comm: syz-executor.4 Not tainted 5.10.230 #1 [ 1611.464634] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1611.466389] Call Trace: [ 1611.466950] dump_stack+0x107/0x167 [ 1611.467721] should_fail.cold+0x5/0xa [ 1611.468535] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 1611.469622] ? shmem_write_begin+0xf7/0x1d0 [ 1611.470631] ? shmem_write_begin+0x100/0x1d0 [ 1611.471529] generic_perform_write+0x279/0x4f0 [ 1611.472472] ? page_cache_prev_miss+0x310/0x310 [ 1611.473425] ? evict_inodes+0x470/0x470 [ 1611.474256] ? generic_write_checks+0x2ad/0x390 [ 1611.475214] __generic_file_write_iter+0x39d/0x5d0 [ 1611.476251] generic_file_write_iter+0xdb/0x230 [ 1611.477189] ? iov_iter_init+0x3c/0x130 [ 1611.478024] new_sync_write+0x42c/0x660 [ 1611.478831] ? new_sync_read+0x6f0/0x6f0 [ 1611.479679] ? __x64_sys_pwrite64+0x201/0x260 [ 1611.481009] ? lock_release+0x680/0x680 [ 1611.482045] ? selinux_file_permission+0x92/0x520 [ 1611.483290] ? security_file_permission+0xb1/0xe0 [ 1611.484680] vfs_write+0x7c0/0xb10 [ 1611.485452] __x64_sys_pwrite64+0x201/0x260 [ 1611.486371] ? ksys_pwrite64+0x1b0/0x1b0 [ 1611.487273] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1611.488427] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1611.489516] do_syscall_64+0x33/0x40 [ 1611.490297] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1611.491370] RIP: 0033:0x7f50ad793ab7 [ 1611.492161] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1611.495919] RSP: 002b:00007f50aad55f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1611.497518] RAX: ffffffffffffffda RBX: 00007f50ad82a970 RCX: 00007f50ad793ab7 [ 1611.499008] RDX: 000000000000005a RSI: 0000000020000540 RDI: 0000000000000005 [ 1611.500498] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1611.501975] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000005 [ 1611.503485] R13: 0000000000000005 R14: 0000000020000440 R15: 0000000000000000 [ 1611.612610] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:04:40 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 16) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:04:40 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 8) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:04:40 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 16) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:04:40 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:04:40 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 23) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1624.362435] FAULT_INJECTION: forcing a failure. [ 1624.362435] name failslab, interval 1, probability 0, space 0, times 0 [ 1624.366399] CPU: 1 PID: 10305 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1624.368245] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1624.370330] Call Trace: [ 1624.371001] dump_stack+0x107/0x167 [ 1624.371923] should_fail.cold+0x5/0xa [ 1624.372891] ? __should_failslab+0x2e/0xf0 [ 1624.373955] ? __d_alloc+0x2a/0x990 [ 1624.374881] should_failslab+0x5/0x20 [ 1624.376028] kmem_cache_alloc+0x5b/0x310 [ 1624.377128] ? trace_hardirqs_on+0x5b/0x180 [ 1624.378444] __d_alloc+0x2a/0x990 [ 1624.379326] d_alloc_pseudo+0x19/0x70 [ 1624.380513] alloc_file_pseudo+0xce/0x250 [ 1624.381561] ? alloc_file+0x5a0/0x5a0 [ 1624.382773] ? shmem_get_inode+0x55c/0xbc0 [ 1624.383314] FAULT_INJECTION: forcing a failure. [ 1624.383314] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1624.383878] __shmem_file_setup+0x144/0x320 [ 1624.383909] ? _copy_from_user+0xfb/0x1b0 [ 1624.388774] __do_sys_memfd_create+0x275/0x450 [ 1624.389951] ? memfd_file_seals_ptr+0x170/0x170 [ 1624.391429] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1624.392775] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1624.394084] do_syscall_64+0x33/0x40 [ 1624.395235] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1624.396557] RIP: 0033:0x7f3e51965b19 [ 1624.397721] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1624.402380] RSP: 002b:00007f3e4eedaf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1624.404330] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f3e51965b19 [ 1624.406125] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f3e519bf0fb [ 1624.407942] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1624.409641] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1624.411159] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000140 [ 1624.412722] CPU: 0 PID: 10307 Comm: syz-executor.4 Not tainted 5.10.230 #1 [ 1624.414318] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1624.416225] Call Trace: [ 1624.416830] dump_stack+0x107/0x167 [ 1624.417665] should_fail.cold+0x5/0xa [ 1624.418538] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 1624.419758] ? shmem_write_begin+0xf7/0x1d0 [ 1624.420751] ? shmem_write_begin+0x100/0x1d0 [ 1624.421755] generic_perform_write+0x279/0x4f0 [ 1624.422810] ? __mnt_drop_write_file+0x9/0x70 [ 1624.423834] ? page_cache_prev_miss+0x310/0x310 [ 1624.424904] ? evict_inodes+0x470/0x470 [ 1624.425814] ? generic_write_checks+0x2ad/0x390 [ 1624.426880] __generic_file_write_iter+0x39d/0x5d0 [ 1624.428019] generic_file_write_iter+0xdb/0x230 [ 1624.429086] ? iov_iter_init+0x3c/0x130 [ 1624.429994] new_sync_write+0x42c/0x660 [ 1624.430913] ? new_sync_read+0x6f0/0x6f0 [ 1624.431843] ? __x64_sys_pwrite64+0x201/0x260 [ 1624.432876] ? lock_release+0x680/0x680 [ 1624.433784] ? selinux_file_permission+0x92/0x520 [ 1624.434886] ? security_file_permission+0xb1/0xe0 [ 1624.435986] vfs_write+0x7c0/0xb10 [ 1624.436804] __x64_sys_pwrite64+0x201/0x260 [ 1624.437777] ? ksys_pwrite64+0x1b0/0x1b0 [ 1624.438692] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1624.439865] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1624.441037] do_syscall_64+0x33/0x40 [ 1624.441879] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1624.442981] RIP: 0033:0x7f50ad793ab7 [ 1624.443809] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1624.447981] RSP: 002b:00007f50aad55f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1624.449721] RAX: ffffffffffffffda RBX: 00007f50ad82a970 RCX: 00007f50ad793ab7 [ 1624.451346] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000005 [ 1624.452979] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1624.454606] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000005 [ 1624.456243] R13: 0000000000000005 R14: 0000000020000488 R15: 0000000000000003 [ 1624.472595] FAULT_INJECTION: forcing a failure. [ 1624.472595] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1624.475936] CPU: 1 PID: 10315 Comm: syz-executor.3 Not tainted 5.10.230 #1 [ 1624.477425] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1624.477553] FAULT_INJECTION: forcing a failure. [ 1624.477553] name failslab, interval 1, probability 0, space 0, times 0 [ 1624.479161] Call Trace: [ 1624.479190] dump_stack+0x107/0x167 [ 1624.479210] should_fail.cold+0x5/0xa [ 1624.479240] strncpy_from_user+0x34/0x470 [ 1624.484710] getname_flags.part.0+0x95/0x4f0 [ 1624.485642] getname+0x8e/0xd0 [ 1624.486308] do_sys_openat2+0xf9/0x4d0 [ 1624.487129] ? build_open_flags+0x6f0/0x6f0 [ 1624.488030] ? rcu_read_lock_any_held+0x75/0xa0 [ 1624.489010] __x64_sys_openat+0x13f/0x1f0 [ 1624.489879] ? __ia32_sys_open+0x1c0/0x1c0 [ 1624.490767] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1624.491869] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1624.492957] do_syscall_64+0x33/0x40 [ 1624.493740] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1624.494816] RIP: 0033:0x7fcc93db7a04 [ 1624.495592] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1624.499451] RSP: 002b:00007fcc91379ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1624.501091] RAX: ffffffffffffffda RBX: 00007fcc93e4e970 RCX: 00007fcc93db7a04 [ 1624.502643] RDX: 0000000000000002 RSI: 00007fcc9137a000 RDI: 00000000ffffff9c [ 1624.504178] RBP: 00007fcc9137a000 R08: 0000000000000000 R09: ffffffffffffffff [ 1624.505703] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1624.507238] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1624.508814] CPU: 0 PID: 10316 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1624.510502] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1624.512517] Call Trace: [ 1624.513159] dump_stack+0x107/0x167 [ 1624.514044] should_fail.cold+0x5/0xa [ 1624.515128] ? io_wq_create+0xeb/0xc00 [ 1624.516081] should_failslab+0x5/0x20 [ 1624.517015] __kmalloc+0x72/0x390 [ 1624.517864] io_wq_create+0xeb/0xc00 [ 1624.518814] io_uring_alloc_task_context+0x1f1/0x6a0 [ 1624.520168] ? io_import_iovec+0x1120/0x1120 [ 1624.521252] ? io_apoll_task_func+0x2d0/0x2d0 [ 1624.522351] ? __io_req_find_next+0x300/0x300 [ 1624.523445] ? do_raw_spin_lock+0x121/0x260 [ 1624.524502] ? rwlock_bug.part.0+0x90/0x90 [ 1624.525545] __io_uring_add_tctx_node+0x2c6/0x520 [ 1624.526726] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1624.528005] ? alloc_fd+0x2e7/0x670 [ 1624.528909] io_uring_setup+0x1fbb/0x2980 [ 1624.529928] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1624.531163] ? wait_for_completion_io+0x270/0x270 [ 1624.532349] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1624.533622] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1624.534869] do_syscall_64+0x33/0x40 [ 1624.535746] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1624.537003] RIP: 0033:0x7fcc97c5ab19 [ 1624.537903] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1624.542280] RSP: 002b:00007fcc951af108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1624.544127] RAX: ffffffffffffffda RBX: 00007fcc97d6e020 RCX: 00007fcc97c5ab19 [ 1624.545852] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1624.547557] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1624.549275] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1624.550980] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 22:04:40 executing program 6: getpgid(0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x22902, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_io_uring_complete(0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x5d, 0x0, @thr={&(0x7f00000002c0)="c58435b56fadce6925a8c5ef8299d1c9436890996f121c55fd3949c7ffe74e562d5b7ad3ba81ec2ee03296fc177baf9eb677c3b886f2d2f6f15bbb7648f001000000a7e1de93ae4056fd27712f2d24552e5d7d39ec16e048786d22b4989871bad0f0ee169831b6e6f3e5f6aec27d337087b8119f6d755f6e40547c31e63fdaf4b4593725c72c370172c9527216a415009b28cfab12175e4c530e215b70f7b654b1cc73e9eabfb340bcf589b70ae5e8acd00b6770b80a2a135bf9bd68f3679d8a46b4c50a69d29136daef4804fe9cb5f8caceaeb2b7310d7154d547c522215a4a59b9787a63c4e818bd23c5668aa30f9e030613", &(0x7f0000000540)="2ac7a21c8555cb8161df3e647dcdb023da28a1a647a16e4f8e6fa8febca24d45c7a3d99bb9f57cbd2a9300e181ca7c1e21a348b0080a5409b2a4e4d827024c7bc481"}}, &(0x7f0000000180)) r1 = socket$netlink(0x10, 0x3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000080)=""/200, 0x20000148}], 0x1, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000003c0)=""/101, 0x65) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000240), &(0x7f0000000440)={'L-', 0x3}, 0x16, 0x3) 22:04:40 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 51) 22:04:40 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) [ 1624.560716] FAULT_INJECTION: forcing a failure. [ 1624.560716] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1624.563824] CPU: 0 PID: 10321 Comm: syz-executor.7 Not tainted 5.10.230 #1 [ 1624.565504] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1624.567463] Call Trace: [ 1624.568114] dump_stack+0x107/0x167 [ 1624.568999] should_fail.cold+0x5/0xa [ 1624.569944] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 1624.571247] ? shmem_write_begin+0xf7/0x1d0 [ 1624.572318] ? shmem_write_begin+0x100/0x1d0 [ 1624.573384] generic_perform_write+0x279/0x4f0 [ 1624.574523] ? page_cache_prev_miss+0x310/0x310 [ 1624.575654] ? evict_inodes+0x470/0x470 [ 1624.576647] ? generic_write_checks+0x2ad/0x390 [ 1624.577779] __generic_file_write_iter+0x39d/0x5d0 [ 1624.579001] generic_file_write_iter+0xdb/0x230 [ 1624.580117] ? iov_iter_init+0x3c/0x130 [ 1624.581117] new_sync_write+0x42c/0x660 [ 1624.582104] ? new_sync_read+0x6f0/0x6f0 [ 1624.583096] ? __x64_sys_pwrite64+0x201/0x260 [ 1624.584226] ? lock_release+0x680/0x680 [ 1624.585222] ? selinux_file_permission+0x92/0x520 [ 1624.586430] ? security_file_permission+0xb1/0xe0 [ 1624.587645] vfs_write+0x7c0/0xb10 [ 1624.588551] __x64_sys_pwrite64+0x201/0x260 [ 1624.589630] ? ksys_pwrite64+0x1b0/0x1b0 [ 1624.590649] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1624.591959] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1624.593151] do_syscall_64+0x33/0x40 [ 1624.593945] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1624.595040] RIP: 0033:0x7f3576635ab7 [ 1624.595838] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1624.599777] RSP: 002b:00007f3573bf7f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1624.601413] RAX: ffffffffffffffda RBX: 00007f35766cc970 RCX: 00007f3576635ab7 [ 1624.602959] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000005 [ 1624.604513] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1624.606061] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000005 [ 1624.607604] R13: 0000000000000005 R14: 0000000020000488 R15: 0000000000000003 22:04:40 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 24) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:04:40 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 9) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1624.724457] FAULT_INJECTION: forcing a failure. [ 1624.724457] name failslab, interval 1, probability 0, space 0, times 0 [ 1624.727485] CPU: 0 PID: 10331 Comm: syz-executor.3 Not tainted 5.10.230 #1 [ 1624.729148] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1624.731117] Call Trace: [ 1624.731744] dump_stack+0x107/0x167 [ 1624.732624] should_fail.cold+0x5/0xa [ 1624.733527] ? __alloc_file+0x21/0x320 [ 1624.734454] should_failslab+0x5/0x20 [ 1624.735367] kmem_cache_alloc+0x5b/0x310 [ 1624.736352] __alloc_file+0x21/0x320 [ 1624.737244] alloc_empty_file+0x6d/0x170 [ 1624.738239] path_openat+0xe6/0x2770 [ 1624.739134] ? __lock_acquire+0x1657/0x5b00 [ 1624.740208] ? path_lookupat+0x860/0x860 [ 1624.741205] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1624.742482] ? lock_acquire+0x197/0x470 [ 1624.743452] ? find_held_lock+0x2c/0x110 [ 1624.744464] do_filp_open+0x190/0x3e0 [ 1624.745395] ? may_open_dev+0xf0/0xf0 [ 1624.746331] ? alloc_fd+0x2e7/0x670 [ 1624.747226] ? lock_downgrade+0x6d0/0x6d0 [ 1624.748247] ? do_raw_spin_lock+0x121/0x260 [ 1624.749303] ? rwlock_bug.part.0+0x90/0x90 [ 1624.750346] ? _raw_spin_unlock+0x1a/0x30 [ 1624.751355] ? alloc_fd+0x2e7/0x670 [ 1624.752263] do_sys_openat2+0x171/0x4d0 [ 1624.753236] ? build_open_flags+0x6f0/0x6f0 [ 1624.754301] ? rcu_read_lock_any_held+0x75/0xa0 [ 1624.755442] __x64_sys_openat+0x13f/0x1f0 [ 1624.756464] ? __ia32_sys_open+0x1c0/0x1c0 [ 1624.757505] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1624.758797] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1624.760070] do_syscall_64+0x33/0x40 [ 1624.760999] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1624.762267] RIP: 0033:0x7fcc93db7a04 [ 1624.763173] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1624.767643] RSP: 002b:00007fcc91379ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1624.769503] RAX: ffffffffffffffda RBX: 00007fcc93e4e970 RCX: 00007fcc93db7a04 [ 1624.771240] RDX: 0000000000000002 RSI: 00007fcc9137a000 RDI: 00000000ffffff9c [ 1624.772984] RBP: 00007fcc9137a000 R08: 0000000000000000 R09: ffffffffffffffff [ 1624.774707] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1624.776440] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1624.790466] FAULT_INJECTION: forcing a failure. [ 1624.790466] name failslab, interval 1, probability 0, space 0, times 0 [ 1624.793292] CPU: 0 PID: 10337 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1624.794987] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1624.797031] Call Trace: [ 1624.797680] dump_stack+0x107/0x167 [ 1624.798578] should_fail.cold+0x5/0xa [ 1624.799500] ? create_object.isra.0+0x3a/0xa20 [ 1624.800624] should_failslab+0x5/0x20 [ 1624.801558] kmem_cache_alloc+0x5b/0x310 [ 1624.802560] create_object.isra.0+0x3a/0xa20 [ 1624.803626] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1624.804901] kmem_cache_alloc+0x159/0x310 [ 1624.805915] ? trace_hardirqs_on+0x5b/0x180 [ 1624.806989] __d_alloc+0x2a/0x990 [ 1624.807843] d_alloc_pseudo+0x19/0x70 [ 1624.808776] alloc_file_pseudo+0xce/0x250 [ 1624.809799] ? alloc_file+0x5a0/0x5a0 [ 1624.810736] ? shmem_get_inode+0x55c/0xbc0 [ 1624.811796] __shmem_file_setup+0x144/0x320 [ 1624.812886] ? _copy_from_user+0xfb/0x1b0 [ 1624.813915] __do_sys_memfd_create+0x275/0x450 [ 1624.815051] ? memfd_file_seals_ptr+0x170/0x170 [ 1624.816213] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1624.817513] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1624.818815] do_syscall_64+0x33/0x40 [ 1624.819734] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1624.821005] RIP: 0033:0x7f3e51965b19 [ 1624.821930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1624.826245] RSP: 002b:00007f3e4eeb9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1624.827861] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f3e51965b19 [ 1624.829372] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f3e519bf0fb [ 1624.830889] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1624.832415] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1624.833908] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000140 [ 1624.863623] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:04:40 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 52) [ 1624.898350] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:04:40 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc35", 0x66}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:04:40 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 17) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1624.937563] FAULT_INJECTION: forcing a failure. [ 1624.937563] name failslab, interval 1, probability 0, space 0, times 0 [ 1624.940164] CPU: 1 PID: 10343 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1624.941746] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1624.943631] Call Trace: [ 1624.944247] dump_stack+0x107/0x167 [ 1624.945079] should_fail.cold+0x5/0xa [ 1624.945955] ? io_wq_create+0x6ef/0xc00 [ 1624.946858] should_failslab+0x5/0x20 [ 1624.947738] kmem_cache_alloc_node_trace+0x59/0x340 [ 1624.948924] io_wq_create+0x6ef/0xc00 [ 1624.949801] io_uring_alloc_task_context+0x1f1/0x6a0 [ 1624.950987] ? io_import_iovec+0x1120/0x1120 [ 1624.951996] ? io_apoll_task_func+0x2d0/0x2d0 [ 1624.953072] ? __io_req_find_next+0x300/0x300 [ 1624.954098] ? do_raw_spin_lock+0x121/0x260 [ 1624.955114] ? rwlock_bug.part.0+0x90/0x90 [ 1624.956087] __io_uring_add_tctx_node+0x2c6/0x520 [ 1624.957232] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1624.958430] ? alloc_fd+0x2e7/0x670 [ 1624.959300] io_uring_setup+0x1fbb/0x2980 [ 1624.960271] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1624.961455] ? wait_for_completion_io+0x270/0x270 [ 1624.962592] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1624.963837] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1624.965077] do_syscall_64+0x33/0x40 [ 1624.965959] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1624.967177] RIP: 0033:0x7fcc97c5ab19 [ 1624.968071] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1624.972512] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1624.974335] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1624.976033] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1624.977750] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1624.979459] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1624.981169] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1625.005463] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:04:40 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 25) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:04:40 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 17) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:04:40 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) [ 1625.065299] FAULT_INJECTION: forcing a failure. [ 1625.065299] name failslab, interval 1, probability 0, space 0, times 0 [ 1625.067363] CPU: 0 PID: 10349 Comm: syz-executor.3 Not tainted 5.10.230 #1 [ 1625.068714] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1625.070357] Call Trace: 22:04:41 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 10) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1625.070889] dump_stack+0x107/0x167 [ 1625.071625] should_fail.cold+0x5/0xa [ 1625.072245] ? create_object.isra.0+0x3a/0xa20 [ 1625.072969] should_failslab+0x5/0x20 [ 1625.073574] kmem_cache_alloc+0x5b/0x310 [ 1625.074222] create_object.isra.0+0x3a/0xa20 [ 1625.074872] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1625.075688] kmem_cache_alloc+0x159/0x310 [ 1625.076317] __alloc_file+0x21/0x320 [ 1625.076912] alloc_empty_file+0x6d/0x170 [ 1625.077517] path_openat+0xe6/0x2770 [ 1625.078114] ? __lock_acquire+0x1657/0x5b00 [ 1625.078764] ? path_lookupat+0x860/0x860 [ 1625.079418] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1625.080214] ? lock_acquire+0x197/0x470 [ 1625.080859] ? find_held_lock+0x2c/0x110 [ 1625.081522] do_filp_open+0x190/0x3e0 [ 1625.082096] ? may_open_dev+0xf0/0xf0 [ 1625.082715] ? alloc_fd+0x2e7/0x670 [ 1625.083266] ? lock_downgrade+0x6d0/0x6d0 [ 1625.083934] ? do_raw_spin_lock+0x121/0x260 [ 1625.084593] ? rwlock_bug.part.0+0x90/0x90 [ 1625.085280] ? _raw_spin_unlock+0x1a/0x30 [ 1625.085391] FAULT_INJECTION: forcing a failure. [ 1625.085391] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1625.085896] ? alloc_fd+0x2e7/0x670 [ 1625.085918] do_sys_openat2+0x171/0x4d0 [ 1625.085942] ? build_open_flags+0x6f0/0x6f0 [ 1625.090906] ? rcu_read_lock_any_held+0x75/0xa0 [ 1625.091843] __x64_sys_openat+0x13f/0x1f0 [ 1625.092530] ? __ia32_sys_open+0x1c0/0x1c0 [ 1625.093380] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1625.094229] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1625.095244] do_syscall_64+0x33/0x40 [ 1625.095847] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1625.096865] RIP: 0033:0x7fcc93db7a04 [ 1625.097474] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1625.101152] RSP: 002b:00007fcc91379ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1625.102388] RAX: ffffffffffffffda RBX: 00007fcc93e4e970 RCX: 00007fcc93db7a04 [ 1625.103827] RDX: 0000000000000002 RSI: 00007fcc9137a000 RDI: 00000000ffffff9c [ 1625.105258] RBP: 00007fcc9137a000 R08: 0000000000000000 R09: ffffffffffffffff [ 1625.106683] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1625.107961] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1625.109407] CPU: 1 PID: 10353 Comm: syz-executor.4 Not tainted 5.10.230 #1 [ 1625.110913] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1625.112751] Call Trace: [ 1625.113317] dump_stack+0x107/0x167 [ 1625.113442] FAULT_INJECTION: forcing a failure. [ 1625.113442] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1625.114086] should_fail.cold+0x5/0xa [ 1625.114112] __alloc_pages_nodemask+0x182/0x600 [ 1625.114135] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1625.114161] ? lock_downgrade+0x6d0/0x6d0 [ 1625.120156] ? lock_acquire+0x197/0x470 [ 1625.121023] alloc_pages_vma+0xbb/0x410 [ 1625.121872] shmem_alloc_page+0x10f/0x1e0 [ 1625.122752] ? shmem_init_inode+0x20/0x20 [ 1625.123654] ? percpu_counter_add_batch+0x8b/0x140 [ 1625.124711] ? __vm_enough_memory+0x184/0x360 [ 1625.125667] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 1625.126801] ? shmem_unuse_inode+0xf60/0xf60 [ 1625.127738] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1625.128815] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1625.129873] shmem_write_begin+0xf7/0x1d0 [ 1625.130754] generic_perform_write+0x20a/0x4f0 [ 1625.131717] ? page_cache_prev_miss+0x310/0x310 [ 1625.132704] ? evict_inodes+0x470/0x470 [ 1625.133531] ? generic_write_checks+0x2ad/0x390 [ 1625.134509] __generic_file_write_iter+0x39d/0x5d0 [ 1625.135536] generic_file_write_iter+0xdb/0x230 [ 1625.136503] ? iov_iter_init+0x3c/0x130 [ 1625.137334] new_sync_write+0x42c/0x660 [ 1625.138160] ? new_sync_read+0x6f0/0x6f0 [ 1625.139006] ? __x64_sys_pwrite64+0x201/0x260 [ 1625.139940] ? lock_release+0x680/0x680 [ 1625.140774] ? selinux_file_permission+0x92/0x520 [ 1625.141778] ? security_file_permission+0xb1/0xe0 [ 1625.142789] vfs_write+0x7c0/0xb10 [ 1625.143544] __x64_sys_pwrite64+0x201/0x260 [ 1625.144448] ? ksys_pwrite64+0x1b0/0x1b0 [ 1625.145298] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1625.146387] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1625.147453] do_syscall_64+0x33/0x40 [ 1625.148234] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1625.149299] RIP: 0033:0x7f50ad793ab7 [ 1625.150069] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1625.153891] RSP: 002b:00007f50aad55f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1625.155472] RAX: ffffffffffffffda RBX: 00007f50ad82a970 RCX: 00007f50ad793ab7 [ 1625.156972] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000005 [ 1625.158451] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1625.159940] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000005 [ 1625.161435] R13: 0000000000000005 R14: 00000000200004a0 R15: 0000000000000004 [ 1625.162962] CPU: 0 PID: 10354 Comm: syz-executor.7 Not tainted 5.10.230 #1 [ 1625.164089] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1625.165390] Call Trace: [ 1625.165791] dump_stack+0x107/0x167 [ 1625.166413] should_fail.cold+0x5/0xa [ 1625.167011] __alloc_pages_nodemask+0x182/0x600 [ 1625.167729] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1625.168669] ? lock_downgrade+0x6d0/0x6d0 [ 1625.169296] ? lock_acquire+0x197/0x470 [ 1625.169917] alloc_pages_vma+0xbb/0x410 [ 1625.170511] shmem_alloc_page+0x10f/0x1e0 [ 1625.171127] ? shmem_init_inode+0x20/0x20 [ 1625.171784] ? percpu_counter_add_batch+0x8b/0x140 [ 1625.172597] ? __vm_enough_memory+0x184/0x360 [ 1625.173300] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 1625.174169] ? shmem_unuse_inode+0xf60/0xf60 [ 1625.174825] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1625.175631] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1625.176398] shmem_write_begin+0xf7/0x1d0 [ 1625.177066] generic_perform_write+0x20a/0x4f0 [ 1625.177763] ? page_cache_prev_miss+0x310/0x310 [ 1625.178495] ? evict_inodes+0x470/0x470 [ 1625.179085] ? generic_write_checks+0x2ad/0x390 [ 1625.179823] __generic_file_write_iter+0x39d/0x5d0 [ 1625.180557] generic_file_write_iter+0xdb/0x230 [ 1625.181295] ? iov_iter_init+0x3c/0x130 [ 1625.181887] new_sync_write+0x42c/0x660 [ 1625.182528] ? new_sync_read+0x6f0/0x6f0 [ 1625.183169] ? __x64_sys_pwrite64+0x201/0x260 [ 1625.183879] ? lock_release+0x680/0x680 [ 1625.184519] ? selinux_file_permission+0x92/0x520 [ 1625.185275] ? security_file_permission+0xb1/0xe0 [ 1625.186045] vfs_write+0x7c0/0xb10 [ 1625.186609] __x64_sys_pwrite64+0x201/0x260 [ 1625.187283] ? ksys_pwrite64+0x1b0/0x1b0 [ 1625.187932] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1625.188764] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1625.189578] do_syscall_64+0x33/0x40 [ 1625.190167] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1625.190929] RIP: 0033:0x7f3576635ab7 [ 1625.191512] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1625.194410] RSP: 002b:00007f3573bf7f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1625.195610] RAX: ffffffffffffffda RBX: 00007f35766cc970 RCX: 00007f3576635ab7 [ 1625.196740] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000005 [ 1625.197866] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1625.198991] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000005 [ 1625.200109] R13: 0000000000000005 R14: 00000000200004a0 R15: 0000000000000004 22:04:41 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 18) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:04:41 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 53) 22:04:41 executing program 6: getpgid(0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x22902, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_io_uring_complete(0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x5d, 0x0, @thr={&(0x7f00000002c0)="c58435b56fadce6925a8c5ef8299d1c9436890996f121c55fd3949c7ffe74e562d5b7ad3ba81ec2ee03296fc177baf9eb677c3b886f2d2f6f15bbb7648f001000000a7e1de93ae4056fd27712f2d24552e5d7d39ec16e048786d22b4989871bad0f0ee169831b6e6f3e5f6aec27d337087b8119f6d755f6e40547c31e63fdaf4b4593725c72c370172c9527216a415009b28cfab12175e4c530e215b70f7b654b1cc73e9eabfb340bcf589b70ae5e8acd00b6770b80a2a135bf9bd68f3679d8a46b4c50a69d29136daef4804fe9cb5f8caceaeb2b7310d7154d547c522215a4a59b9787a63c4e818bd23c5668aa30f9e030613", &(0x7f0000000540)="2ac7a21c8555cb8161df3e647dcdb023da28a1a647a16e4f8e6fa8febca24d45c7a3d99bb9f57cbd2a9300e181ca7c1e21a348b0080a5409b2a4e4d827024c7bc481"}}, &(0x7f0000000180)) r1 = socket$netlink(0x10, 0x3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000080)=""/200, 0x20000148}], 0x1, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000003c0)=""/101, 0x65) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000240), &(0x7f0000000440)={'L-', 0x3}, 0x16, 0x3) [ 1625.283870] FAULT_INJECTION: forcing a failure. [ 1625.283870] name failslab, interval 1, probability 0, space 0, times 0 [ 1625.286615] CPU: 1 PID: 10361 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1625.288095] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1625.289835] Call Trace: [ 1625.290395] dump_stack+0x107/0x167 [ 1625.291164] should_fail.cold+0x5/0xa [ 1625.291964] ? __alloc_file+0x21/0x320 [ 1625.292795] should_failslab+0x5/0x20 [ 1625.293597] kmem_cache_alloc+0x5b/0x310 [ 1625.294457] __alloc_file+0x21/0x320 [ 1625.295243] alloc_empty_file+0x6d/0x170 [ 1625.296103] alloc_file+0x5e/0x5a0 [ 1625.296851] alloc_file_pseudo+0x16a/0x250 [ 1625.297741] ? alloc_file+0x5a0/0x5a0 [ 1625.298539] ? shmem_get_inode+0x55c/0xbc0 [ 1625.299438] __shmem_file_setup+0x144/0x320 [ 1625.300356] ? _copy_from_user+0xfb/0x1b0 [ 1625.301234] __do_sys_memfd_create+0x275/0x450 [ 1625.302197] ? memfd_file_seals_ptr+0x170/0x170 [ 1625.303175] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1625.304294] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1625.305384] do_syscall_64+0x33/0x40 [ 1625.306164] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1625.307246] RIP: 0033:0x7f3e51965b19 [ 1625.308029] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1625.311920] RSP: 002b:00007f3e4eedaf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1625.313518] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f3e51965b19 [ 1625.315005] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f3e519bf0fb [ 1625.316504] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1625.317990] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1625.319473] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000140 [ 1625.330569] FAULT_INJECTION: forcing a failure. [ 1625.330569] name failslab, interval 1, probability 0, space 0, times 0 [ 1625.332968] CPU: 1 PID: 10360 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1625.334425] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1625.336167] Call Trace: [ 1625.336731] dump_stack+0x107/0x167 [ 1625.337494] should_fail.cold+0x5/0xa [ 1625.338299] ? create_object.isra.0+0x3a/0xa20 [ 1625.339257] should_failslab+0x5/0x20 [ 1625.340053] kmem_cache_alloc+0x5b/0x310 [ 1625.340918] ? io_uring_alloc_task_context+0xf5/0x6a0 [ 1625.342002] create_object.isra.0+0x3a/0xa20 [ 1625.342907] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1625.343970] __kmalloc+0x16e/0x390 [ 1625.344721] io_wq_create+0xeb/0xc00 [ 1625.345513] io_uring_alloc_task_context+0x1f1/0x6a0 [ 1625.346559] ? io_import_iovec+0x1120/0x1120 [ 1625.347482] ? io_apoll_task_func+0x2d0/0x2d0 [ 1625.348408] ? __io_req_find_next+0x300/0x300 [ 1625.349333] ? do_raw_spin_lock+0x121/0x260 [ 1625.350230] ? rwlock_bug.part.0+0x90/0x90 [ 1625.351119] __io_uring_add_tctx_node+0x2c6/0x520 [ 1625.352122] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1625.353222] ? alloc_fd+0x2e7/0x670 [ 1625.353999] io_uring_setup+0x1fbb/0x2980 [ 1625.354870] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1625.355927] ? wait_for_completion_io+0x270/0x270 [ 1625.356963] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1625.358054] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1625.359140] do_syscall_64+0x33/0x40 [ 1625.359914] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1625.360986] RIP: 0033:0x7fcc97c5ab19 [ 1625.361760] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1625.365591] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1625.367175] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1625.368667] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1625.370147] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1625.371629] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1625.373117] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1625.376830] FAULT_INJECTION: forcing a failure. [ 1625.376830] name failslab, interval 1, probability 0, space 0, times 0 [ 1625.379143] CPU: 1 PID: 10369 Comm: syz-executor.4 Not tainted 5.10.230 #1 [ 1625.380585] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1625.382310] Call Trace: [ 1625.382861] dump_stack+0x107/0x167 [ 1625.383619] should_fail.cold+0x5/0xa [ 1625.384423] ? xas_alloc+0x336/0x440 [ 1625.385207] should_failslab+0x5/0x20 [ 1625.385999] kmem_cache_alloc+0x5b/0x310 [ 1625.386838] ? trace_hardirqs_on+0x5b/0x180 [ 1625.387751] xas_alloc+0x336/0x440 [ 1625.388505] xas_create+0x60f/0x10d0 [ 1625.389298] xas_create_range+0x189/0x620 [ 1625.390176] shmem_add_to_page_cache+0x760/0x1130 [ 1625.391192] ? shmem_getattr+0x1a0/0x1a0 [ 1625.392064] shmem_getpage_gfp.constprop.0+0x64a/0x1920 [ 1625.393202] ? shmem_unuse_inode+0xf60/0xf60 [ 1625.394126] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1625.395195] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1625.396269] shmem_write_begin+0xf7/0x1d0 [ 1625.397146] generic_perform_write+0x20a/0x4f0 [ 1625.398119] ? page_cache_prev_miss+0x310/0x310 [ 1625.399085] ? evict_inodes+0x470/0x470 [ 1625.399913] ? generic_write_checks+0x2ad/0x390 [ 1625.400893] __generic_file_write_iter+0x39d/0x5d0 [ 1625.401922] generic_file_write_iter+0xdb/0x230 [ 1625.402890] ? iov_iter_init+0x3c/0x130 [ 1625.403722] new_sync_write+0x42c/0x660 [ 1625.404557] ? new_sync_read+0x6f0/0x6f0 [ 1625.405415] ? __x64_sys_pwrite64+0x201/0x260 [ 1625.406367] ? lock_release+0x680/0x680 [ 1625.407203] ? selinux_file_permission+0x92/0x520 [ 1625.408219] ? security_file_permission+0xb1/0xe0 [ 1625.409237] vfs_write+0x7c0/0xb10 [ 1625.409986] __x64_sys_pwrite64+0x201/0x260 [ 1625.410884] ? ksys_pwrite64+0x1b0/0x1b0 [ 1625.411732] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1625.412833] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1625.413911] do_syscall_64+0x33/0x40 [ 1625.414688] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1625.415752] RIP: 0033:0x7f50ad793ab7 [ 1625.416536] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1625.420361] RSP: 002b:00007f50aad55f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1625.421940] RAX: ffffffffffffffda RBX: 00007f50ad82a970 RCX: 00007f50ad793ab7 [ 1625.423427] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000005 [ 1625.424922] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1625.426409] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000005 [ 1625.427886] R13: 0000000000000005 R14: 00000000200004a0 R15: 0000000000000004 [ 1625.449967] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1625.453906] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: special inode unallocated [ 1625.456722] EXT4-fs (loop7): get root inode failed [ 1625.457696] EXT4-fs (loop7): mount failed [ 1625.575633] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:04:55 executing program 6: getpgid(0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x22902, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_io_uring_complete(0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x5d, 0x0, @thr={&(0x7f00000002c0)="c58435b56fadce6925a8c5ef8299d1c9436890996f121c55fd3949c7ffe74e562d5b7ad3ba81ec2ee03296fc177baf9eb677c3b886f2d2f6f15bbb7648f001000000a7e1de93ae4056fd27712f2d24552e5d7d39ec16e048786d22b4989871bad0f0ee169831b6e6f3e5f6aec27d337087b8119f6d755f6e40547c31e63fdaf4b4593725c72c370172c9527216a415009b28cfab12175e4c530e215b70f7b654b1cc73e9eabfb340bcf589b70ae5e8acd00b6770b80a2a135bf9bd68f3679d8a46b4c50a69d29136daef4804fe9cb5f8caceaeb2b7310d7154d547c522215a4a59b9787a63c4e818bd23c5668aa30f9e030613", &(0x7f0000000540)="2ac7a21c8555cb8161df3e647dcdb023da28a1a647a16e4f8e6fa8febca24d45c7a3d99bb9f57cbd2a9300e181ca7c1e21a348b0080a5409b2a4e4d827024c7bc481"}}, &(0x7f0000000180)) r1 = socket$netlink(0x10, 0x3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000080)=""/200, 0x20000148}], 0x1, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000003c0)=""/101, 0x65) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000240), &(0x7f0000000440)={'L-', 0x3}, 0x16, 0x3) 22:04:55 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 19) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:04:55 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc35", 0x66}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:04:55 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 54) 22:04:55 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) 22:04:55 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 11) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:04:55 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 26) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:04:55 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 18) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1639.598910] FAULT_INJECTION: forcing a failure. [ 1639.598910] name failslab, interval 1, probability 0, space 0, times 0 [ 1639.600833] FAULT_INJECTION: forcing a failure. [ 1639.600833] name failslab, interval 1, probability 0, space 0, times 0 [ 1639.600858] CPU: 1 PID: 10395 Comm: syz-executor.7 Not tainted 5.10.230 #1 [ 1639.600869] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1639.600876] Call Trace: [ 1639.600903] dump_stack+0x107/0x167 [ 1639.600927] should_fail.cold+0x5/0xa [ 1639.600949] ? xas_alloc+0x336/0x440 [ 1639.600985] should_failslab+0x5/0x20 [ 1639.601006] kmem_cache_alloc+0x5b/0x310 [ 1639.601024] ? trace_hardirqs_on+0x5b/0x180 [ 1639.601050] xas_alloc+0x336/0x440 [ 1639.601075] xas_create+0x60f/0x10d0 [ 1639.601117] xas_create_range+0x189/0x620 [ 1639.601159] shmem_add_to_page_cache+0x760/0x1130 [ 1639.601195] ? shmem_getattr+0x1a0/0x1a0 [ 1639.601246] shmem_getpage_gfp.constprop.0+0x64a/0x1920 [ 1639.621099] ? shmem_unuse_inode+0xf60/0xf60 [ 1639.622050] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1639.623231] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1639.624308] shmem_write_begin+0xf7/0x1d0 [ 1639.625202] generic_perform_write+0x20a/0x4f0 [ 1639.626172] ? page_cache_prev_miss+0x310/0x310 [ 1639.627149] ? evict_inodes+0x470/0x470 [ 1639.627981] ? generic_write_checks+0x2ad/0x390 [ 1639.628986] __generic_file_write_iter+0x39d/0x5d0 [ 1639.630035] generic_file_write_iter+0xdb/0x230 [ 1639.630999] ? iov_iter_init+0x3c/0x130 [ 1639.631852] new_sync_write+0x42c/0x660 [ 1639.632711] ? new_sync_read+0x6f0/0x6f0 [ 1639.633563] ? __x64_sys_pwrite64+0x201/0x260 [ 1639.634510] ? lock_release+0x680/0x680 [ 1639.635347] ? selinux_file_permission+0x92/0x520 [ 1639.636361] ? security_file_permission+0xb1/0xe0 [ 1639.637401] vfs_write+0x7c0/0xb10 [ 1639.638156] __x64_sys_pwrite64+0x201/0x260 [ 1639.639076] ? ksys_pwrite64+0x1b0/0x1b0 [ 1639.639928] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1639.641032] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1639.642110] do_syscall_64+0x33/0x40 [ 1639.642893] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1639.643968] RIP: 0033:0x7f3576635ab7 [ 1639.644759] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1639.648635] RSP: 002b:00007f3573bf7f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1639.650251] RAX: ffffffffffffffda RBX: 00007f35766cc970 RCX: 00007f3576635ab7 [ 1639.651742] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000005 [ 1639.653242] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1639.654771] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000005 [ 1639.656278] R13: 0000000000000005 R14: 00000000200004a0 R15: 0000000000000004 [ 1639.657850] CPU: 0 PID: 10392 Comm: syz-executor.3 Not tainted 5.10.230 #1 [ 1639.659060] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1639.660405] Call Trace: [ 1639.660854] dump_stack+0x107/0x167 [ 1639.661094] FAULT_INJECTION: forcing a failure. [ 1639.661094] name failslab, interval 1, probability 0, space 0, times 0 [ 1639.661453] should_fail.cold+0x5/0xa [ 1639.664367] ? security_file_alloc+0x34/0x170 [ 1639.665112] should_failslab+0x5/0x20 [ 1639.665732] kmem_cache_alloc+0x5b/0x310 [ 1639.666390] security_file_alloc+0x34/0x170 [ 1639.667089] __alloc_file+0xb7/0x320 [ 1639.667694] alloc_empty_file+0x6d/0x170 [ 1639.668351] path_openat+0xe6/0x2770 [ 1639.668964] ? __lock_acquire+0x1657/0x5b00 [ 1639.669667] ? path_lookupat+0x860/0x860 [ 1639.670318] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1639.671156] ? lock_acquire+0x197/0x470 [ 1639.671795] ? find_held_lock+0x2c/0x110 [ 1639.672452] do_filp_open+0x190/0x3e0 [ 1639.673076] ? may_open_dev+0xf0/0xf0 [ 1639.673690] ? alloc_fd+0x2e7/0x670 [ 1639.674272] ? lock_downgrade+0x6d0/0x6d0 [ 1639.674938] ? do_raw_spin_lock+0x121/0x260 [ 1639.675654] ? rwlock_bug.part.0+0x90/0x90 [ 1639.676338] ? _raw_spin_unlock+0x1a/0x30 [ 1639.677020] ? alloc_fd+0x2e7/0x670 [ 1639.677610] do_sys_openat2+0x171/0x4d0 [ 1639.678251] ? build_open_flags+0x6f0/0x6f0 [ 1639.678946] ? rcu_read_lock_any_held+0x75/0xa0 [ 1639.679696] __x64_sys_openat+0x13f/0x1f0 [ 1639.680362] ? __ia32_sys_open+0x1c0/0x1c0 [ 1639.681065] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1639.681909] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1639.682741] do_syscall_64+0x33/0x40 [ 1639.683339] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1639.684163] RIP: 0033:0x7fcc93db7a04 [ 1639.684764] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1639.687733] RSP: 002b:00007fcc91379ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1639.688947] RAX: ffffffffffffffda RBX: 00007fcc93e4e970 RCX: 00007fcc93db7a04 [ 1639.690093] RDX: 0000000000000002 RSI: 00007fcc9137a000 RDI: 00000000ffffff9c [ 1639.691229] RBP: 00007fcc9137a000 R08: 0000000000000000 R09: ffffffffffffffff [ 1639.692365] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1639.693507] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1639.694662] CPU: 1 PID: 10387 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1639.696079] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1639.697805] Call Trace: [ 1639.698361] dump_stack+0x107/0x167 [ 1639.699125] should_fail.cold+0x5/0xa [ 1639.699908] ? __io_uring_add_tctx_node+0x15c/0x520 [ 1639.700955] should_failslab+0x5/0x20 [ 1639.701737] kmem_cache_alloc_trace+0x55/0x320 [ 1639.702670] FAULT_INJECTION: forcing a failure. [ 1639.702670] name failslab, interval 1, probability 0, space 0, times 0 [ 1639.702711] __io_uring_add_tctx_node+0x15c/0x520 [ 1639.705624] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1639.706720] ? alloc_fd+0x2e7/0x670 [ 1639.707473] io_uring_setup+0x1fbb/0x2980 [ 1639.708353] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1639.709391] ? wait_for_completion_io+0x270/0x270 [ 1639.710428] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1639.711492] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1639.712577] do_syscall_64+0x33/0x40 [ 1639.713338] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1639.714417] RIP: 0033:0x7fcc97c5ab19 [ 1639.715185] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1639.719070] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1639.720623] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1639.722134] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1639.723578] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1639.725115] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1639.726567] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1639.728169] CPU: 0 PID: 10398 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1639.729533] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1639.731124] Call Trace: [ 1639.731576] dump_stack+0x107/0x167 [ 1639.732273] should_fail.cold+0x5/0xa [ 1639.732893] ? create_object.isra.0+0x3a/0xa20 [ 1639.733761] should_failslab+0x5/0x20 [ 1639.734362] kmem_cache_alloc+0x5b/0x310 [ 1639.735151] create_object.isra.0+0x3a/0xa20 [ 1639.735853] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1639.736830] kmem_cache_alloc+0x159/0x310 [ 1639.737500] __alloc_file+0x21/0x320 [ 1639.738195] alloc_empty_file+0x6d/0x170 [ 1639.738836] alloc_file+0x5e/0x5a0 [ 1639.739506] alloc_file_pseudo+0x16a/0x250 [ 1639.740165] ? alloc_file+0x5a0/0x5a0 [ 1639.740899] ? shmem_get_inode+0x55c/0xbc0 [ 1639.741545] __shmem_file_setup+0x144/0x320 [ 1639.742364] ? _copy_from_user+0xfb/0x1b0 [ 1639.742728] FAULT_INJECTION: forcing a failure. [ 1639.742728] name failslab, interval 1, probability 0, space 0, times 0 [ 1639.743015] __do_sys_memfd_create+0x275/0x450 [ 1639.746260] ? memfd_file_seals_ptr+0x170/0x170 [ 1639.746976] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1639.747779] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1639.748555] do_syscall_64+0x33/0x40 [ 1639.749121] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1639.749908] RIP: 0033:0x7f3e51965b19 [ 1639.750474] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1639.753290] RSP: 002b:00007f3e4eedaf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1639.754477] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f3e51965b19 [ 1639.755571] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f3e519bf0fb [ 1639.756655] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1639.757757] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1639.758830] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000140 [ 1639.759937] CPU: 1 PID: 10397 Comm: syz-executor.4 Not tainted 5.10.230 #1 [ 1639.761463] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1639.763219] Call Trace: [ 1639.763777] dump_stack+0x107/0x167 [ 1639.764548] should_fail.cold+0x5/0xa [ 1639.765361] ? create_object.isra.0+0x3a/0xa20 [ 1639.766333] should_failslab+0x5/0x20 [ 1639.767135] kmem_cache_alloc+0x5b/0x310 [ 1639.767999] create_object.isra.0+0x3a/0xa20 [ 1639.768955] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1639.770030] kmem_cache_alloc+0x159/0x310 [ 1639.770903] ? trace_hardirqs_on+0x5b/0x180 [ 1639.771823] xas_alloc+0x336/0x440 [ 1639.772576] xas_create+0x60f/0x10d0 [ 1639.773391] xas_create_range+0x189/0x620 [ 1639.774283] shmem_add_to_page_cache+0x760/0x1130 [ 1639.775312] ? shmem_getattr+0x1a0/0x1a0 [ 1639.776192] shmem_getpage_gfp.constprop.0+0x64a/0x1920 [ 1639.777345] ? shmem_unuse_inode+0xf60/0xf60 [ 1639.778241] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1639.779333] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1639.780416] shmem_write_begin+0xf7/0x1d0 [ 1639.781306] generic_perform_write+0x20a/0x4f0 [ 1639.782282] ? page_cache_prev_miss+0x310/0x310 [ 1639.783219] ? evict_inodes+0x470/0x470 [ 1639.784060] ? generic_write_checks+0x2ad/0x390 [ 1639.785043] __generic_file_write_iter+0x39d/0x5d0 [ 1639.786087] generic_file_write_iter+0xdb/0x230 [ 1639.787032] ? iov_iter_init+0x3c/0x130 [ 1639.787885] new_sync_write+0x42c/0x660 [ 1639.788704] ? new_sync_read+0x6f0/0x6f0 [ 1639.789638] ? __x64_sys_pwrite64+0x201/0x260 [ 1639.790607] ? lock_release+0x680/0x680 [ 1639.791546] ? selinux_file_permission+0x92/0x520 [ 1639.792709] ? security_file_permission+0xb1/0xe0 [ 1639.793902] vfs_write+0x7c0/0xb10 [ 1639.794745] __x64_sys_pwrite64+0x201/0x260 [ 1639.795711] ? ksys_pwrite64+0x1b0/0x1b0 [ 1639.796797] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1639.798032] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1639.799231] do_syscall_64+0x33/0x40 [ 1639.800124] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1639.801379] RIP: 0033:0x7f50ad793ab7 [ 1639.802190] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1639.806442] RSP: 002b:00007f50aad55f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1639.808284] RAX: ffffffffffffffda RBX: 00007f50ad82a970 RCX: 00007f50ad793ab7 [ 1639.809928] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000005 [ 1639.811677] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1639.813208] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000005 [ 1639.814848] R13: 0000000000000005 R14: 00000000200004a0 R15: 0000000000000004 [ 1639.875888] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1639.878961] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:04:55 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 27) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:04:55 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc35", 0x66}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:04:55 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 12) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1639.933960] FAULT_INJECTION: forcing a failure. [ 1639.933960] name failslab, interval 1, probability 0, space 0, times 0 [ 1639.935876] CPU: 0 PID: 10413 Comm: syz-executor.3 Not tainted 5.10.230 #1 [ 1639.936825] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1639.938180] Call Trace: [ 1639.938565] dump_stack+0x107/0x167 [ 1639.939168] should_fail.cold+0x5/0xa [ 1639.939795] ? create_object.isra.0+0x3a/0xa20 [ 1639.940410] should_failslab+0x5/0x20 [ 1639.941037] kmem_cache_alloc+0x5b/0x310 [ 1639.941582] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1639.942487] create_object.isra.0+0x3a/0xa20 [ 1639.943089] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1639.943924] kmem_cache_alloc+0x159/0x310 [ 1639.944539] security_file_alloc+0x34/0x170 [ 1639.945235] __alloc_file+0xb7/0x320 [ 1639.945735] alloc_empty_file+0x6d/0x170 [ 1639.946384] path_openat+0xe6/0x2770 [ 1639.946927] ? __lock_acquire+0x1657/0x5b00 [ 1639.947622] ? path_lookupat+0x860/0x860 [ 1639.948170] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1639.949026] ? lock_acquire+0x197/0x470 [ 1639.949596] ? find_held_lock+0x2c/0x110 [ 1639.950260] do_filp_open+0x190/0x3e0 [ 1639.950780] ? may_open_dev+0xf0/0xf0 [ 1639.951396] ? alloc_fd+0x2e7/0x670 [ 1639.951896] ? lock_downgrade+0x6d0/0x6d0 [ 1639.952556] ? do_raw_spin_lock+0x121/0x260 [ 1639.953203] ? rwlock_bug.part.0+0x90/0x90 [ 1639.953887] ? _raw_spin_unlock+0x1a/0x30 [ 1639.954447] ? alloc_fd+0x2e7/0x670 [ 1639.955049] do_sys_openat2+0x171/0x4d0 [ 1639.955595] ? build_open_flags+0x6f0/0x6f0 [ 1639.956304] ? rcu_read_lock_any_held+0x75/0xa0 [ 1639.956955] __x64_sys_openat+0x13f/0x1f0 [ 1639.957619] ? __ia32_sys_open+0x1c0/0x1c0 [ 1639.958210] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1639.959046] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1639.959755] do_syscall_64+0x33/0x40 [ 1639.960346] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1639.961065] RIP: 0033:0x7fcc93db7a04 [ 1639.961655] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1639.964277] RSP: 002b:00007fcc91379ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1639.965494] RAX: ffffffffffffffda RBX: 00007fcc93e4e970 RCX: 00007fcc93db7a04 [ 1639.966475] RDX: 0000000000000002 RSI: 00007fcc9137a000 RDI: 00000000ffffff9c [ 1639.967428] RBP: 00007fcc9137a000 R08: 0000000000000000 R09: ffffffffffffffff [ 1639.968400] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1639.969539] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1640.022504] FAULT_INJECTION: forcing a failure. [ 1640.022504] name failslab, interval 1, probability 0, space 0, times 0 [ 1640.025272] CPU: 1 PID: 10418 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1640.026735] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1640.028481] Call Trace: [ 1640.029047] dump_stack+0x107/0x167 [ 1640.029817] should_fail.cold+0x5/0xa [ 1640.030615] ? security_file_alloc+0x34/0x170 [ 1640.031555] should_failslab+0x5/0x20 [ 1640.032352] kmem_cache_alloc+0x5b/0x310 [ 1640.033238] security_file_alloc+0x34/0x170 [ 1640.034147] __alloc_file+0xb7/0x320 [ 1640.034944] alloc_empty_file+0x6d/0x170 [ 1640.035798] alloc_file+0x5e/0x5a0 [ 1640.036550] alloc_file_pseudo+0x16a/0x250 [ 1640.037482] ? alloc_file+0x5a0/0x5a0 [ 1640.038291] ? shmem_get_inode+0x55c/0xbc0 [ 1640.039211] __shmem_file_setup+0x144/0x320 [ 1640.040123] ? _copy_from_user+0xfb/0x1b0 [ 1640.041023] __do_sys_memfd_create+0x275/0x450 [ 1640.041981] ? memfd_file_seals_ptr+0x170/0x170 [ 1640.042989] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1640.044088] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1640.045359] do_syscall_64+0x33/0x40 [ 1640.046336] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1640.047673] RIP: 0033:0x7f3e51965b19 [ 1640.048649] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1640.052857] RSP: 002b:00007f3e4eedaf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1640.054499] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f3e51965b19 [ 1640.056034] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f3e519bf0fb [ 1640.057572] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1640.059108] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1640.060640] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000140 [ 1640.085302] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1640.128218] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:05:08 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 19) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:05:08 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070", 0x99}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:05:08 executing program 6: getpgid(0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x22902, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_io_uring_complete(0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x5d, 0x0, @thr={&(0x7f00000002c0)="c58435b56fadce6925a8c5ef8299d1c9436890996f121c55fd3949c7ffe74e562d5b7ad3ba81ec2ee03296fc177baf9eb677c3b886f2d2f6f15bbb7648f001000000a7e1de93ae4056fd27712f2d24552e5d7d39ec16e048786d22b4989871bad0f0ee169831b6e6f3e5f6aec27d337087b8119f6d755f6e40547c31e63fdaf4b4593725c72c370172c9527216a415009b28cfab12175e4c530e215b70f7b654b1cc73e9eabfb340bcf589b70ae5e8acd00b6770b80a2a135bf9bd68f3679d8a46b4c50a69d29136daef4804fe9cb5f8caceaeb2b7310d7154d547c522215a4a59b9787a63c4e818bd23c5668aa30f9e030613", &(0x7f0000000540)="2ac7a21c8555cb8161df3e647dcdb023da28a1a647a16e4f8e6fa8febca24d45c7a3d99bb9f57cbd2a9300e181ca7c1e21a348b0080a5409b2a4e4d827024c7bc481ad488ef6fded915ad2c221d17d526fba95e126bf2c8f45e164040e2fc26125b81d"}}, &(0x7f0000000180)) r1 = socket$netlink(0x10, 0x3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000080)=""/200, 0x20000148}], 0x1, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000003c0)=""/101, 0x65) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000240), &(0x7f0000000440)={'L-', 0x3}, 0x16, 0x3) 22:05:08 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 13) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:05:08 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 20) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:05:08 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 55) 22:05:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 28) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:05:08 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) [ 1652.131776] FAULT_INJECTION: forcing a failure. [ 1652.131776] name failslab, interval 1, probability 0, space 0, times 0 [ 1652.133201] CPU: 0 PID: 10436 Comm: syz-executor.7 Not tainted 5.10.230 #1 [ 1652.134065] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1652.135112] Call Trace: [ 1652.135450] dump_stack+0x107/0x167 [ 1652.135907] should_fail.cold+0x5/0xa [ 1652.136402] ? create_object.isra.0+0x3a/0xa20 [ 1652.136989] should_failslab+0x5/0x20 [ 1652.137479] kmem_cache_alloc+0x5b/0x310 [ 1652.137996] create_object.isra.0+0x3a/0xa20 [ 1652.138540] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1652.139171] kmem_cache_alloc+0x159/0x310 [ 1652.139689] ? trace_hardirqs_on+0x5b/0x180 [ 1652.140224] xas_alloc+0x336/0x440 [ 1652.140666] xas_create+0x60f/0x10d0 [ 1652.141147] xas_create_range+0x189/0x620 [ 1652.141674] shmem_add_to_page_cache+0x760/0x1130 [ 1652.142284] ? shmem_getattr+0x1a0/0x1a0 [ 1652.142804] shmem_getpage_gfp.constprop.0+0x64a/0x1920 [ 1652.143480] ? shmem_unuse_inode+0xf60/0xf60 [ 1652.144028] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1652.144675] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1652.145317] shmem_write_begin+0xf7/0x1d0 [ 1652.145840] generic_perform_write+0x20a/0x4f0 [ 1652.146412] ? page_cache_prev_miss+0x310/0x310 [ 1652.146986] ? evict_inodes+0x470/0x470 [ 1652.147482] ? generic_write_checks+0x2ad/0x390 [ 1652.148069] __generic_file_write_iter+0x39d/0x5d0 [ 1652.148682] generic_file_write_iter+0xdb/0x230 [ 1652.149268] ? iov_iter_init+0x3c/0x130 [ 1652.149766] new_sync_write+0x42c/0x660 [ 1652.150257] ? new_sync_read+0x6f0/0x6f0 [ 1652.150770] ? __x64_sys_pwrite64+0x201/0x260 [ 1652.151326] ? lock_release+0x680/0x680 [ 1652.151822] ? selinux_file_permission+0x92/0x520 [ 1652.152425] ? security_file_permission+0xb1/0xe0 [ 1652.153025] vfs_write+0x7c0/0xb10 [ 1652.153476] __x64_sys_pwrite64+0x201/0x260 [ 1652.154017] ? ksys_pwrite64+0x1b0/0x1b0 [ 1652.154521] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1652.155184] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1652.155823] do_syscall_64+0x33/0x40 [ 1652.156286] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1652.156925] RIP: 0033:0x7f3576635ab7 [ 1652.157396] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1652.159687] RSP: 002b:00007f3573bf7f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1652.160635] RAX: ffffffffffffffda RBX: 00007f35766cc970 RCX: 00007f3576635ab7 [ 1652.161528] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000005 [ 1652.162415] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1652.163295] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000005 [ 1652.164178] R13: 0000000000000005 R14: 00000000200004a0 R15: 0000000000000004 [ 1652.169569] FAULT_INJECTION: forcing a failure. [ 1652.169569] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1652.171153] CPU: 0 PID: 10441 Comm: syz-executor.4 Not tainted 5.10.230 #1 [ 1652.172040] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1652.173109] Call Trace: [ 1652.173448] dump_stack+0x107/0x167 [ 1652.173916] should_fail.cold+0x5/0xa [ 1652.174406] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 1652.175084] ? shmem_write_begin+0xf7/0x1d0 [ 1652.175624] ? shmem_write_begin+0x100/0x1d0 [ 1652.176175] generic_perform_write+0x279/0x4f0 [ 1652.176710] FAULT_INJECTION: forcing a failure. [ 1652.176710] name failslab, interval 1, probability 0, space 0, times 0 [ 1652.176760] ? page_cache_prev_miss+0x310/0x310 [ 1652.179673] ? evict_inodes+0x470/0x470 [ 1652.180173] ? generic_write_checks+0x2ad/0x390 [ 1652.180748] __generic_file_write_iter+0x39d/0x5d0 [ 1652.181372] generic_file_write_iter+0xdb/0x230 [ 1652.181935] ? iov_iter_init+0x3c/0x130 [ 1652.182431] new_sync_write+0x42c/0x660 [ 1652.182918] ? new_sync_read+0x6f0/0x6f0 [ 1652.183427] ? __x64_sys_pwrite64+0x201/0x260 [ 1652.183980] ? lock_release+0x680/0x680 [ 1652.184469] ? selinux_file_permission+0x92/0x520 [ 1652.185076] ? security_file_permission+0xb1/0xe0 [ 1652.185673] vfs_write+0x7c0/0xb10 [ 1652.186120] __x64_sys_pwrite64+0x201/0x260 [ 1652.186656] ? ksys_pwrite64+0x1b0/0x1b0 [ 1652.187154] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1652.187790] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1652.188436] do_syscall_64+0x33/0x40 [ 1652.188896] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1652.189532] RIP: 0033:0x7f50ad793ab7 [ 1652.189985] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1652.192281] RSP: 002b:00007f50aad55f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1652.193221] RAX: ffffffffffffffda RBX: 00007f50ad82a970 RCX: 00007f50ad793ab7 [ 1652.194094] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000005 [ 1652.194998] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1652.195880] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000005 [ 1652.196750] R13: 0000000000000005 R14: 00000000200004a0 R15: 0000000000000004 [ 1652.197660] CPU: 1 PID: 10440 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1652.198857] FAULT_INJECTION: forcing a failure. [ 1652.198857] name failslab, interval 1, probability 0, space 0, times 0 [ 1652.199157] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1652.199165] Call Trace: [ 1652.199191] dump_stack+0x107/0x167 [ 1652.199211] should_fail.cold+0x5/0xa [ 1652.199233] ? create_object.isra.0+0x3a/0xa20 [ 1652.205977] should_failslab+0x5/0x20 [ 1652.206991] kmem_cache_alloc+0x5b/0x310 [ 1652.208064] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1652.209502] create_object.isra.0+0x3a/0xa20 [ 1652.210614] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1652.211929] kmem_cache_alloc+0x159/0x310 [ 1652.213017] security_file_alloc+0x34/0x170 [ 1652.214135] __alloc_file+0xb7/0x320 [ 1652.215096] alloc_empty_file+0x6d/0x170 [ 1652.216140] alloc_file+0x5e/0x5a0 [ 1652.217050] alloc_file_pseudo+0x16a/0x250 [ 1652.218153] ? alloc_file+0x5a0/0x5a0 [ 1652.219139] ? shmem_get_inode+0x55c/0xbc0 [ 1652.220240] __shmem_file_setup+0x144/0x320 [ 1652.221357] ? _copy_from_user+0xfb/0x1b0 [ 1652.222423] __do_sys_memfd_create+0x275/0x450 [ 1652.223528] ? memfd_file_seals_ptr+0x170/0x170 [ 1652.224577] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1652.225853] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1652.227012] do_syscall_64+0x33/0x40 [ 1652.227911] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1652.229048] RIP: 0033:0x7f3e51965b19 [ 1652.229862] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1652.233953] RSP: 002b:00007f3e4eedaf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1652.235562] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f3e51965b19 [ 1652.237070] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f3e519bf0fb [ 1652.238581] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1652.240090] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1652.241591] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000140 [ 1652.243342] CPU: 0 PID: 10442 Comm: syz-executor.3 Not tainted 5.10.230 #1 [ 1652.244191] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1652.245196] Call Trace: [ 1652.245530] dump_stack+0x107/0x167 [ 1652.245964] should_fail.cold+0x5/0xa [ 1652.246423] ? __kthread_create_on_node+0xd1/0x400 [ 1652.247006] should_failslab+0x5/0x20 [ 1652.247466] kmem_cache_alloc_trace+0x55/0x320 [ 1652.248012] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1652.248575] __kthread_create_on_node+0xd1/0x400 [ 1652.249149] ? __kthread_parkme+0x1d0/0x1d0 [ 1652.249672] ? __mutex_lock+0x4fe/0x10b0 [ 1652.250155] ? loop_configure+0xcb9/0x1490 [ 1652.250668] ? do_raw_spin_unlock+0x4f/0x220 [ 1652.251192] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1652.251765] kthread_create_on_node+0xbb/0x100 [ 1652.252311] ? __kthread_create_on_node+0x400/0x400 [ 1652.252918] ? lockdep_init_map_type+0x2c7/0x780 [ 1652.253523] ? lockdep_init_map_type+0x2c7/0x780 [ 1652.254116] loop_configure+0x3e7/0x1490 [ 1652.254614] lo_ioctl+0xa72/0x1760 [ 1652.255038] ? avc_has_extended_perms+0x7f1/0xf40 [ 1652.255609] ? loop_set_status_old+0x250/0x250 [ 1652.256151] ? avc_ss_reset+0x180/0x180 [ 1652.256623] ? find_held_lock+0x2c/0x110 [ 1652.257117] ? __lock_acquire+0xbb1/0x5b00 [ 1652.257643] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1652.258271] ? generic_block_fiemap+0x60/0x60 [ 1652.258816] ? lock_downgrade+0x6d0/0x6d0 [ 1652.259316] ? build_open_flags+0x6f0/0x6f0 [ 1652.259828] ? loop_set_status_old+0x250/0x250 [ 1652.260371] blkdev_ioctl+0x291/0x710 [ 1652.260821] ? blkdev_common_ioctl+0x1930/0x1930 [ 1652.261394] ? selinux_file_ioctl+0xb6/0x270 [ 1652.261918] block_ioctl+0xf9/0x140 [ 1652.262344] ? blkdev_read_iter+0x1c0/0x1c0 [ 1652.262856] __x64_sys_ioctl+0x19a/0x210 [ 1652.263343] do_syscall_64+0x33/0x40 [ 1652.263781] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1652.264390] RIP: 0033:0x7fcc93e048d7 [ 1652.264839] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1652.267035] RSP: 002b:00007fcc91379f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1652.267940] RAX: ffffffffffffffda RBX: 00007fcc93e4e970 RCX: 00007fcc93e048d7 [ 1652.268785] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1652.269650] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 1652.270504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1652.271347] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1652.325362] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:05:08 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 21) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:05:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 29) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1652.364092] FAULT_INJECTION: forcing a failure. [ 1652.364092] name failslab, interval 1, probability 0, space 0, times 0 [ 1652.365502] CPU: 0 PID: 10438 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1652.366334] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1652.367306] Call Trace: [ 1652.367628] dump_stack+0x107/0x167 [ 1652.368065] should_fail.cold+0x5/0xa [ 1652.368528] ? create_object.isra.0+0x3a/0xa20 [ 1652.369093] should_failslab+0x5/0x20 [ 1652.369573] kmem_cache_alloc+0x5b/0x310 [ 1652.370070] ? io_wq_create+0x114/0xc00 [ 1652.370560] create_object.isra.0+0x3a/0xa20 [ 1652.371096] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1652.371719] kmem_cache_alloc_node_trace+0x16d/0x340 [ 1652.372360] io_wq_create+0x6ef/0xc00 [ 1652.372840] io_uring_alloc_task_context+0x1f1/0x6a0 [ 1652.373471] ? io_import_iovec+0x1120/0x1120 [ 1652.373987] ? io_apoll_task_func+0x2d0/0x2d0 [ 1652.374512] ? __io_req_find_next+0x300/0x300 [ 1652.375045] ? do_raw_spin_lock+0x121/0x260 [ 1652.375555] ? rwlock_bug.part.0+0x90/0x90 [ 1652.376062] __io_uring_add_tctx_node+0x2c6/0x520 [ 1652.376639] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1652.377272] ? alloc_fd+0x2e7/0x670 [ 1652.377707] io_uring_setup+0x1fbb/0x2980 [ 1652.378198] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1652.378792] ? wait_for_completion_io+0x270/0x270 [ 1652.379373] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1652.379985] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1652.380587] do_syscall_64+0x33/0x40 [ 1652.381029] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1652.381624] RIP: 0033:0x7fcc97c5ab19 [ 1652.382059] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1652.384166] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1652.385038] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1652.385869] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1652.386687] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1652.387500] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1652.388317] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1652.393977] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:05:08 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070", 0x99}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:05:08 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0x0, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) [ 1652.424823] FAULT_INJECTION: forcing a failure. [ 1652.424823] name failslab, interval 1, probability 0, space 0, times 0 [ 1652.426629] CPU: 0 PID: 10461 Comm: syz-executor.3 Not tainted 5.10.230 #1 [ 1652.427409] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1652.428354] Call Trace: [ 1652.428658] dump_stack+0x107/0x167 [ 1652.429072] should_fail.cold+0x5/0xa [ 1652.429511] ? create_object.isra.0+0x3a/0xa20 [ 1652.430033] should_failslab+0x5/0x20 [ 1652.430464] kmem_cache_alloc+0x5b/0x310 [ 1652.430927] create_object.isra.0+0x3a/0xa20 [ 1652.431422] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1652.432001] kmem_cache_alloc_trace+0x151/0x320 [ 1652.432530] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1652.433071] __kthread_create_on_node+0xd1/0x400 [ 1652.433712] ? __kthread_parkme+0x1d0/0x1d0 [ 1652.434215] ? __mutex_lock+0x4fe/0x10b0 [ 1652.434681] ? loop_configure+0xcb9/0x1490 [ 1652.435161] ? do_raw_spin_unlock+0x4f/0x220 [ 1652.435660] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1652.436195] kthread_create_on_node+0xbb/0x100 [ 1652.436711] ? __kthread_create_on_node+0x400/0x400 [ 1652.437283] ? lockdep_init_map_type+0x2c7/0x780 [ 1652.437822] ? lockdep_init_map_type+0x2c7/0x780 [ 1652.438361] loop_configure+0x3e7/0x1490 [ 1652.438825] lo_ioctl+0xa72/0x1760 [ 1652.439226] ? avc_has_extended_perms+0x7f1/0xf40 [ 1652.439775] ? loop_set_status_old+0x250/0x250 [ 1652.440292] ? avc_ss_reset+0x180/0x180 [ 1652.440751] ? find_held_lock+0x2c/0x110 [ 1652.441221] ? __lock_acquire+0xbb1/0x5b00 [ 1652.441722] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1652.442310] ? generic_block_fiemap+0x60/0x60 [ 1652.442832] ? lock_downgrade+0x6d0/0x6d0 [ 1652.443300] ? build_open_flags+0x6f0/0x6f0 [ 1652.443795] ? loop_set_status_old+0x250/0x250 [ 1652.444310] blkdev_ioctl+0x291/0x710 [ 1652.444746] ? blkdev_common_ioctl+0x1930/0x1930 [ 1652.445290] ? selinux_file_ioctl+0xb6/0x270 [ 1652.445797] block_ioctl+0xf9/0x140 [ 1652.446209] ? blkdev_read_iter+0x1c0/0x1c0 [ 1652.446699] __x64_sys_ioctl+0x19a/0x210 [ 1652.447161] do_syscall_64+0x33/0x40 [ 1652.447593] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1652.448170] RIP: 0033:0x7fcc93e048d7 [ 1652.448590] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1652.450680] RSP: 002b:00007fcc91379f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1652.451540] RAX: ffffffffffffffda RBX: 00007fcc93e4e970 RCX: 00007fcc93e048d7 [ 1652.452346] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1652.453154] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 1652.453959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1652.454765] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 22:05:08 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 20) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1652.471577] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1652.485180] FAULT_INJECTION: forcing a failure. [ 1652.485180] name failslab, interval 1, probability 0, space 0, times 0 [ 1652.486697] CPU: 0 PID: 10470 Comm: syz-executor.4 Not tainted 5.10.230 #1 [ 1652.487496] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1652.488450] Call Trace: [ 1652.488756] dump_stack+0x107/0x167 [ 1652.489182] should_fail.cold+0x5/0xa [ 1652.489620] ? getname_flags.part.0+0x50/0x4f0 [ 1652.490149] should_failslab+0x5/0x20 [ 1652.490579] kmem_cache_alloc+0x5b/0x310 [ 1652.491044] ? new_sync_write+0x499/0x660 [ 1652.491513] getname_flags.part.0+0x50/0x4f0 [ 1652.492011] getname+0x8e/0xd0 [ 1652.492373] do_sys_openat2+0xf9/0x4d0 [ 1652.492813] ? build_open_flags+0x6f0/0x6f0 [ 1652.493310] ? rcu_read_lock_any_held+0x75/0xa0 [ 1652.493838] __x64_sys_openat+0x13f/0x1f0 [ 1652.494307] ? __ia32_sys_open+0x1c0/0x1c0 [ 1652.494788] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1652.495379] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1652.495961] do_syscall_64+0x33/0x40 [ 1652.496381] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1652.496959] RIP: 0033:0x7f50ad793a04 [ 1652.497391] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1652.499476] RSP: 002b:00007f50aad55ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1652.500337] RAX: ffffffffffffffda RBX: 00007f50ad82a970 RCX: 00007f50ad793a04 [ 1652.501150] RDX: 0000000000000002 RSI: 00007f50aad56000 RDI: 00000000ffffff9c [ 1652.501956] RBP: 00007f50aad56000 R08: 0000000000000000 R09: ffffffffffffffff [ 1652.502765] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1652.503568] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 22:05:08 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 14) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1652.565747] FAULT_INJECTION: forcing a failure. [ 1652.565747] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1652.567347] CPU: 0 PID: 10472 Comm: syz-executor.7 Not tainted 5.10.230 #1 [ 1652.568181] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1652.569172] Call Trace: [ 1652.569492] dump_stack+0x107/0x167 [ 1652.569931] should_fail.cold+0x5/0xa [ 1652.570387] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 1652.571024] ? shmem_write_begin+0xf7/0x1d0 [ 1652.571537] ? shmem_write_begin+0x100/0x1d0 [ 1652.572059] generic_perform_write+0x279/0x4f0 [ 1652.572608] ? page_cache_prev_miss+0x310/0x310 [ 1652.573166] ? evict_inodes+0x470/0x470 [ 1652.573629] ? generic_write_checks+0x2ad/0x390 [ 1652.574189] __generic_file_write_iter+0x39d/0x5d0 [ 1652.574776] generic_file_write_iter+0xdb/0x230 [ 1652.575330] ? iov_iter_init+0x3c/0x130 [ 1652.575806] new_sync_write+0x42c/0x660 [ 1652.576279] ? new_sync_read+0x6f0/0x6f0 [ 1652.576760] ? __x64_sys_pwrite64+0x201/0x260 [ 1652.577301] ? lock_release+0x680/0x680 [ 1652.577778] ? selinux_file_permission+0x92/0x520 [ 1652.578345] ? security_file_permission+0xb1/0xe0 [ 1652.578917] vfs_write+0x7c0/0xb10 [ 1652.579340] __x64_sys_pwrite64+0x201/0x260 [ 1652.579852] ? ksys_pwrite64+0x1b0/0x1b0 [ 1652.580329] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1652.580949] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1652.581565] do_syscall_64+0x33/0x40 [ 1652.582004] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1652.582601] RIP: 0033:0x7f3576635ab7 [ 1652.583042] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1652.585232] RSP: 002b:00007f3573bf7f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1652.586117] RAX: ffffffffffffffda RBX: 00007f35766cc970 RCX: 00007f3576635ab7 [ 1652.586946] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000005 [ 1652.587795] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1652.588630] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000005 [ 1652.589484] R13: 0000000000000005 R14: 00000000200004a0 R15: 0000000000000004 [ 1652.615391] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1652.628978] FAULT_INJECTION: forcing a failure. [ 1652.628978] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1652.631939] CPU: 1 PID: 10475 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1652.633412] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1652.635149] Call Trace: [ 1652.635709] dump_stack+0x107/0x167 [ 1652.636473] should_fail.cold+0x5/0xa [ 1652.637286] __alloc_pages_nodemask+0x182/0x600 [ 1652.638263] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1652.639518] ? lock_downgrade+0x6d0/0x6d0 [ 1652.640394] ? lock_acquire+0x197/0x470 [ 1652.641253] alloc_pages_vma+0xbb/0x410 [ 1652.642091] shmem_alloc_page+0x10f/0x1e0 [ 1652.642956] ? shmem_init_inode+0x20/0x20 [ 1652.643841] ? percpu_counter_add_batch+0x8b/0x140 [ 1652.644869] ? __vm_enough_memory+0x184/0x360 [ 1652.645883] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 1652.647205] ? shmem_unuse_inode+0xf60/0xf60 [ 1652.648163] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1652.649253] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1652.650324] shmem_write_begin+0xf7/0x1d0 [ 1652.651201] generic_perform_write+0x20a/0x4f0 [ 1652.652168] ? page_cache_prev_miss+0x310/0x310 [ 1652.653147] ? evict_inodes+0x470/0x470 [ 1652.653977] ? generic_write_checks+0x2ad/0x390 [ 1652.654965] __generic_file_write_iter+0x39d/0x5d0 [ 1652.656005] generic_file_write_iter+0xdb/0x230 [ 1652.656984] ? iov_iter_init+0x3c/0x130 [ 1652.657837] new_sync_write+0x42c/0x660 [ 1652.658691] ? new_sync_read+0x6f0/0x6f0 [ 1652.659542] ? __x64_sys_pwrite64+0x201/0x260 [ 1652.660481] ? lock_release+0x680/0x680 [ 1652.661321] ? selinux_file_permission+0x92/0x520 [ 1652.662388] ? security_file_permission+0xb1/0xe0 [ 1652.663417] vfs_write+0x7c0/0xb10 [ 1652.664162] __x64_sys_pwrite64+0x201/0x260 [ 1652.665070] ? ksys_pwrite64+0x1b0/0x1b0 [ 1652.665931] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1652.667043] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1652.668129] do_syscall_64+0x33/0x40 [ 1652.668908] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1652.670000] RIP: 0033:0x7f3e51918ab7 [ 1652.670788] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1652.674699] RSP: 002b:00007f3e4eedaf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1652.676319] RAX: ffffffffffffffda RBX: 00007f3e519af970 RCX: 00007f3e51918ab7 [ 1652.677832] RDX: 000000000000005a RSI: 0000000020000540 RDI: 0000000000000005 [ 1652.679337] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1652.680848] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000005 [ 1652.682361] R13: 0000000000000005 R14: 0000000020000440 R15: 0000000000000000 22:05:08 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070", 0x99}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1652.735666] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:05:08 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 56) 22:05:08 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 22) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:05:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 30) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1652.814755] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1652.838156] FAULT_INJECTION: forcing a failure. [ 1652.838156] name failslab, interval 1, probability 0, space 0, times 0 [ 1652.840358] CPU: 0 PID: 10488 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1652.841178] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1652.842151] Call Trace: [ 1652.842474] dump_stack+0x107/0x167 [ 1652.842901] should_fail.cold+0x5/0xa [ 1652.843353] ? xas_alloc+0x336/0x440 [ 1652.843801] should_failslab+0x5/0x20 [ 1652.844237] kmem_cache_alloc+0x5b/0x310 [ 1652.844723] ? stack_trace_consume_entry+0x160/0x160 [ 1652.845330] xas_alloc+0x336/0x440 [ 1652.845756] xas_create+0x34a/0x10d0 [ 1652.846199] ? kernel_text_address+0xf2/0x120 [ 1652.846724] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1652.847336] xas_store+0x8c/0x1c40 [ 1652.847760] __xa_store+0x164/0x2d0 [ 1652.848182] ? xa_delete_node+0x280/0x280 [ 1652.848620] FAULT_INJECTION: forcing a failure. [ 1652.848620] name failslab, interval 1, probability 0, space 0, times 0 [ 1652.848673] ? trace_hardirqs_on+0x5b/0x180 [ 1652.851535] xa_store+0x31/0x50 [ 1652.851914] __io_uring_add_tctx_node+0x1cf/0x520 [ 1652.852474] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1652.853075] ? alloc_fd+0x2e7/0x670 [ 1652.853504] io_uring_setup+0x1fbb/0x2980 [ 1652.853984] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1652.854564] ? wait_for_completion_io+0x270/0x270 [ 1652.855126] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1652.855722] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1652.856307] do_syscall_64+0x33/0x40 [ 1652.856737] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1652.857334] RIP: 0033:0x7fcc97c5ab19 [ 1652.857761] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1652.859861] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1652.860730] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1652.861550] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1652.862365] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1652.863178] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1652.863989] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1652.864829] CPU: 1 PID: 10491 Comm: syz-executor.4 Not tainted 5.10.230 #1 [ 1652.866330] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1652.868074] Call Trace: [ 1652.868630] dump_stack+0x107/0x167 [ 1652.869400] should_fail.cold+0x5/0xa [ 1652.870197] ? create_object.isra.0+0x3a/0xa20 [ 1652.871156] should_failslab+0x5/0x20 [ 1652.871943] kmem_cache_alloc+0x5b/0x310 [ 1652.872792] ? __generic_file_write_iter+0x1a4/0x5d0 [ 1652.873864] create_object.isra.0+0x3a/0xa20 [ 1652.874774] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1652.875834] kmem_cache_alloc+0x159/0x310 [ 1652.876696] ? new_sync_write+0x499/0x660 [ 1652.877587] getname_flags.part.0+0x50/0x4f0 [ 1652.878509] getname+0x8e/0xd0 [ 1652.879189] do_sys_openat2+0xf9/0x4d0 [ 1652.880002] ? build_open_flags+0x6f0/0x6f0 [ 1652.880909] ? rcu_read_lock_any_held+0x75/0xa0 [ 1652.881901] __x64_sys_openat+0x13f/0x1f0 [ 1652.882767] ? __ia32_sys_open+0x1c0/0x1c0 [ 1652.883661] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1652.884753] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1652.885836] do_syscall_64+0x33/0x40 [ 1652.886620] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1652.887689] RIP: 0033:0x7f50ad793a04 [ 1652.888473] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1652.892329] RSP: 002b:00007f50aad55ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1652.893936] RAX: ffffffffffffffda RBX: 00007f50ad82a970 RCX: 00007f50ad793a04 [ 1652.895427] RDX: 0000000000000002 RSI: 00007f50aad56000 RDI: 00000000ffffff9c [ 1652.896911] RBP: 00007f50aad56000 R08: 0000000000000000 R09: ffffffffffffffff [ 1652.898422] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1652.899928] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1652.951163] FAULT_INJECTION: forcing a failure. [ 1652.951163] name failslab, interval 1, probability 0, space 0, times 0 [ 1652.952655] CPU: 0 PID: 10495 Comm: syz-executor.3 Not tainted 5.10.230 #1 [ 1652.953496] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1652.954491] Call Trace: [ 1652.954815] dump_stack+0x107/0x167 [ 1652.955256] should_fail.cold+0x5/0xa [ 1652.955717] ? __kernfs_new_node+0xd4/0x860 [ 1652.956221] ? __kernfs_new_node+0xd4/0x860 [ 1652.956729] should_failslab+0x5/0x20 [ 1652.957191] kmem_cache_alloc+0x5b/0x310 [ 1652.957664] ? __kernfs_new_node+0xae/0x860 [ 1652.958170] __kernfs_new_node+0xd4/0x860 [ 1652.958662] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1652.959223] ? mark_held_locks+0x9e/0xe0 [ 1652.959706] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1652.960344] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1652.960975] ? trace_hardirqs_on+0x5b/0x180 [ 1652.961487] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1652.962127] kernfs_new_node+0x18d/0x250 [ 1652.962607] kernfs_create_dir_ns+0x49/0x160 [ 1652.963143] internal_create_group+0x793/0xb30 [ 1652.963686] ? trace_hardirqs_on+0x5b/0x180 [ 1652.964190] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1652.964842] ? sysfs_remove_group+0x170/0x170 [ 1652.965377] ? blk_queue_flag_set+0x22/0x30 [ 1652.965884] ? loop_configure+0x87b/0x1490 [ 1652.966381] ? __loop_update_dio+0x2d2/0x690 [ 1652.966905] loop_configure+0x958/0x1490 [ 1652.967401] lo_ioctl+0xa72/0x1760 [ 1652.967834] ? avc_has_extended_perms+0x7f1/0xf40 [ 1652.968404] ? loop_set_status_old+0x250/0x250 [ 1652.968945] ? avc_ss_reset+0x180/0x180 [ 1652.969423] ? find_held_lock+0x2c/0x110 [ 1652.969911] ? __lock_acquire+0xbb1/0x5b00 [ 1652.970439] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1652.971054] ? generic_block_fiemap+0x60/0x60 [ 1652.971583] ? lock_downgrade+0x6d0/0x6d0 [ 1652.972099] ? build_open_flags+0x6f0/0x6f0 [ 1652.972619] ? loop_set_status_old+0x250/0x250 [ 1652.973173] blkdev_ioctl+0x291/0x710 [ 1652.973629] ? blkdev_common_ioctl+0x1930/0x1930 [ 1652.974191] ? selinux_file_ioctl+0xb6/0x270 [ 1652.974720] block_ioctl+0xf9/0x140 [ 1652.975154] ? blkdev_read_iter+0x1c0/0x1c0 [ 1652.975661] __x64_sys_ioctl+0x19a/0x210 [ 1652.976138] do_syscall_64+0x33/0x40 [ 1652.976577] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1652.977206] RIP: 0033:0x7fcc93e048d7 [ 1652.977646] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1652.979793] RSP: 002b:00007fcc91379f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1652.980680] RAX: ffffffffffffffda RBX: 00007fcc93e4e970 RCX: 00007fcc93e048d7 [ 1652.981501] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1652.982331] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 1652.983143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1652.983955] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1652.984308] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1653.006294] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:05:21 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 21) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:05:21 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 23) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:05:21 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce40", 0xb2}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:05:21 executing program 6: getpgid(0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x22902, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_io_uring_complete(0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x5d, 0x0, @thr={&(0x7f00000002c0)="c58435b56fadce6925a8c5ef8299d1c9436890996f121c55fd3949c7ffe74e562d5b7ad3ba81ec2ee03296fc177baf9eb677c3b886f2d2f6f15bbb7648f001000000a7e1de93ae4056fd27712f2d24552e5d7d39ec16e048786d22b4989871bad0f0ee169831b6e6f3e5f6aec27d337087b8119f6d755f6e40547c31e63fdaf4b4593725c72c370172c9527216a415009b28cfab12175e4c530e215b70f7b654b1cc73e9eabfb340bcf589b70ae5e8acd00b6770b80a2a135bf9bd68f3679d8a46b4c50a69d29136daef4804fe9cb5f8caceaeb2b7310d7154d547c522215a4a59b9787a63c4e818bd23c5668aa30f9e030613", &(0x7f0000000540)="2ac7a21c8555cb8161df3e647dcdb023da28a1a647a16e4f8e6fa8febca24d45c7a3d99bb9f57cbd2a9300e181ca7c1e21a348b0080a5409b2a4e4d827024c7bc481ad488ef6fded915ad2c221d17d526fba95e126bf2c8f45e164040e2fc26125b81d"}}, &(0x7f0000000180)) r1 = socket$netlink(0x10, 0x3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000080)=""/200, 0x20000148}], 0x1, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000003c0)=""/101, 0x65) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000240), &(0x7f0000000440)={'L-', 0x3}, 0x16, 0x3) 22:05:21 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0x0, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) 22:05:21 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 15) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:05:21 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 57) 22:05:21 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 31) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1665.153522] FAULT_INJECTION: forcing a failure. [ 1665.153522] name failslab, interval 1, probability 0, space 0, times 0 [ 1665.156210] CPU: 1 PID: 10508 Comm: syz-executor.3 Not tainted 5.10.230 #1 [ 1665.157677] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1665.159453] Call Trace: [ 1665.160025] dump_stack+0x107/0x167 [ 1665.160806] should_fail.cold+0x5/0xa [ 1665.161633] ? create_object.isra.0+0x3a/0xa20 [ 1665.162609] should_failslab+0x5/0x20 [ 1665.163407] kmem_cache_alloc+0x5b/0x310 [ 1665.164284] create_object.isra.0+0x3a/0xa20 [ 1665.165238] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1665.166337] kmem_cache_alloc+0x159/0x310 [ 1665.167236] __kernfs_new_node+0xd4/0x860 [ 1665.168143] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1665.169164] ? lock_chain_count+0x20/0x20 [ 1665.170080] ? update_load_avg+0x162/0x1870 [ 1665.171009] ? find_held_lock+0x2c/0x110 [ 1665.171887] kernfs_new_node+0x18d/0x250 [ 1665.172769] kernfs_create_dir_ns+0x49/0x160 [ 1665.173732] internal_create_group+0x793/0xb30 [ 1665.174724] ? set_user_nice.part.0+0x2fd/0x760 [ 1665.175727] ? sysfs_remove_group+0x170/0x170 [ 1665.176698] ? lockdep_init_map_type+0x2c7/0x780 [ 1665.177762] ? blk_queue_flag_set+0x22/0x30 [ 1665.178692] ? __loop_update_dio+0x2d2/0x690 [ 1665.179643] loop_configure+0x958/0x1490 [ 1665.180530] lo_ioctl+0xa72/0x1760 [ 1665.181297] ? avc_has_extended_perms+0x7f1/0xf40 [ 1665.182348] ? loop_set_status_old+0x250/0x250 [ 1665.183336] ? avc_ss_reset+0x180/0x180 [ 1665.184197] ? find_held_lock+0x2c/0x110 [ 1665.185083] ? __lock_acquire+0xbb1/0x5b00 [ 1665.186044] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1665.187171] ? generic_block_fiemap+0x60/0x60 [ 1665.188152] ? lock_downgrade+0x6d0/0x6d0 [ 1665.189151] ? build_open_flags+0x6f0/0x6f0 [ 1665.190210] ? loop_set_status_old+0x250/0x250 [ 1665.191310] blkdev_ioctl+0x291/0x710 [ 1665.192230] ? blkdev_common_ioctl+0x1930/0x1930 [ 1665.193378] ? selinux_file_ioctl+0xb6/0x270 [ 1665.194441] block_ioctl+0xf9/0x140 [ 1665.195318] ? blkdev_read_iter+0x1c0/0x1c0 [ 1665.196363] __x64_sys_ioctl+0x19a/0x210 [ 1665.197346] do_syscall_64+0x33/0x40 [ 1665.198253] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1665.199494] RIP: 0033:0x7fcc93e048d7 [ 1665.200394] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1665.204854] RSP: 002b:00007fcc91379f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1665.206710] RAX: ffffffffffffffda RBX: 00007fcc93e4e970 RCX: 00007fcc93e048d7 [ 1665.208434] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1665.210129] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 1665.211832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1665.213520] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1665.235271] FAULT_INJECTION: forcing a failure. [ 1665.235271] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1665.237953] CPU: 0 PID: 10520 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1665.239360] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1665.241092] Call Trace: [ 1665.241649] dump_stack+0x107/0x167 [ 1665.242392] should_fail.cold+0x5/0xa [ 1665.243173] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 1665.244254] ? shmem_write_begin+0xf7/0x1d0 [ 1665.245140] ? shmem_write_begin+0x100/0x1d0 [ 1665.246054] generic_perform_write+0x279/0x4f0 [ 1665.246999] ? page_cache_prev_miss+0x310/0x310 [ 1665.247945] ? evict_inodes+0x470/0x470 [ 1665.248782] ? generic_write_checks+0x2ad/0x390 [ 1665.249748] __generic_file_write_iter+0x39d/0x5d0 [ 1665.250756] generic_file_write_iter+0xdb/0x230 [ 1665.251725] ? iov_iter_init+0x3c/0x130 [ 1665.252534] new_sync_write+0x42c/0x660 [ 1665.253367] ? new_sync_read+0x6f0/0x6f0 [ 1665.254209] ? __x64_sys_pwrite64+0x201/0x260 [ 1665.255152] ? lock_release+0x680/0x680 [ 1665.255960] ? selinux_file_permission+0x92/0x520 [ 1665.256973] ? security_file_permission+0xb1/0xe0 [ 1665.257988] vfs_write+0x7c0/0xb10 [ 1665.258721] __x64_sys_pwrite64+0x201/0x260 [ 1665.259627] ? ksys_pwrite64+0x1b0/0x1b0 [ 1665.260461] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1665.261569] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1665.262644] do_syscall_64+0x33/0x40 [ 1665.263426] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1665.264480] RIP: 0033:0x7f3e51918ab7 [ 1665.265264] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1665.269114] RSP: 002b:00007f3e4eedaf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1665.270670] RAX: ffffffffffffffda RBX: 00007f3e519af970 RCX: 00007f3e51918ab7 [ 1665.272184] RDX: 000000000000005a RSI: 0000000020000540 RDI: 0000000000000005 [ 1665.273706] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1665.275215] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000005 [ 1665.276737] R13: 0000000000000005 R14: 0000000020000440 R15: 0000000000000000 [ 1665.283450] FAULT_INJECTION: forcing a failure. [ 1665.283450] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1665.286023] CPU: 0 PID: 10518 Comm: syz-executor.4 Not tainted 5.10.230 #1 [ 1665.287415] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1665.289095] Call Trace: [ 1665.289641] dump_stack+0x107/0x167 [ 1665.290388] should_fail.cold+0x5/0xa [ 1665.291170] strncpy_from_user+0x34/0x470 [ 1665.292027] getname_flags.part.0+0x95/0x4f0 [ 1665.292920] getname+0x8e/0xd0 [ 1665.293591] do_sys_openat2+0xf9/0x4d0 [ 1665.294387] ? build_open_flags+0x6f0/0x6f0 [ 1665.295297] ? rcu_read_lock_any_held+0x75/0xa0 [ 1665.296306] __x64_sys_openat+0x13f/0x1f0 [ 1665.297148] ? __ia32_sys_open+0x1c0/0x1c0 [ 1665.298080] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1665.299215] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1665.300334] do_syscall_64+0x33/0x40 [ 1665.301129] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1665.302173] RIP: 0033:0x7f50ad793a04 [ 1665.302946] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1665.306865] RSP: 002b:00007f50aad55ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1665.308473] RAX: ffffffffffffffda RBX: 00007f50ad82a970 RCX: 00007f50ad793a04 [ 1665.310001] RDX: 0000000000000002 RSI: 00007f50aad56000 RDI: 00000000ffffff9c [ 1665.311530] RBP: 00007f50aad56000 R08: 0000000000000000 R09: ffffffffffffffff [ 1665.313062] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1665.314584] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1665.319903] FAULT_INJECTION: forcing a failure. [ 1665.319903] name failslab, interval 1, probability 0, space 0, times 0 [ 1665.322504] CPU: 0 PID: 10521 Comm: syz-executor.7 Not tainted 5.10.230 #1 [ 1665.323990] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1665.325763] Call Trace: [ 1665.325912] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1665.326323] dump_stack+0x107/0x167 [ 1665.326343] should_fail.cold+0x5/0xa [ 1665.326362] ? getname_flags.part.0+0x50/0x4f0 [ 1665.326382] should_failslab+0x5/0x20 [ 1665.326400] kmem_cache_alloc+0x5b/0x310 [ 1665.326427] ? new_sync_write+0x499/0x660 [ 1665.333711] getname_flags.part.0+0x50/0x4f0 [ 1665.334661] getname+0x8e/0xd0 [ 1665.335348] do_sys_openat2+0xf9/0x4d0 [ 1665.336168] ? build_open_flags+0x6f0/0x6f0 [ 1665.337092] ? rcu_read_lock_any_held+0x75/0xa0 [ 1665.338094] __x64_sys_openat+0x13f/0x1f0 [ 1665.338972] ? __ia32_sys_open+0x1c0/0x1c0 [ 1665.339881] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1665.341000] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1665.342105] do_syscall_64+0x33/0x40 [ 1665.342905] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1665.343993] RIP: 0033:0x7f3576635a04 [ 1665.344783] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1665.348701] RSP: 002b:00007f3573bf7ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1665.350323] RAX: ffffffffffffffda RBX: 00007f35766cc970 RCX: 00007f3576635a04 [ 1665.351815] RDX: 0000000000000002 RSI: 00007f3573bf8000 RDI: 00000000ffffff9c [ 1665.353319] RBP: 00007f3573bf8000 R08: 0000000000000000 R09: ffffffffffffffff [ 1665.354844] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1665.356349] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 22:05:21 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 32) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:05:21 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce40", 0xb2}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1665.474224] FAULT_INJECTION: forcing a failure. [ 1665.474224] name failslab, interval 1, probability 0, space 0, times 0 [ 1665.476645] CPU: 1 PID: 10517 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1665.478124] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1665.479893] Call Trace: [ 1665.480462] dump_stack+0x107/0x167 [ 1665.481243] should_fail.cold+0x5/0xa [ 1665.482073] ? create_object.isra.0+0x3a/0xa20 [ 1665.483064] should_failslab+0x5/0x20 [ 1665.483882] kmem_cache_alloc+0x5b/0x310 [ 1665.484766] create_object.isra.0+0x3a/0xa20 [ 1665.485724] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1665.486812] kmem_cache_alloc+0x159/0x310 [ 1665.487716] xas_alloc+0x336/0x440 [ 1665.488498] xas_create+0x34a/0x10d0 [ 1665.489312] ? kernel_text_address+0xf2/0x120 [ 1665.490296] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1665.491414] xas_store+0x8c/0x1c40 [ 1665.492207] __xa_store+0x164/0x2d0 [ 1665.492997] ? xa_delete_node+0x280/0x280 [ 1665.493910] ? trace_hardirqs_on+0x5b/0x180 [ 1665.494851] xa_store+0x31/0x50 [ 1665.495566] __io_uring_add_tctx_node+0x1cf/0x520 [ 1665.496605] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1665.497752] ? alloc_fd+0x2e7/0x670 [ 1665.498547] io_uring_setup+0x1fbb/0x2980 [ 1665.499455] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1665.500566] ? wait_for_completion_io+0x270/0x270 [ 1665.501650] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1665.502824] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1665.503974] do_syscall_64+0x33/0x40 [ 1665.504807] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1665.505976] RIP: 0033:0x7fcc97c5ab19 [ 1665.506816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1665.510955] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1665.512661] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1665.514281] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1665.515907] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1665.517534] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1665.519063] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 22:05:21 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 22) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:05:21 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0x0, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) [ 1665.546998] FAULT_INJECTION: forcing a failure. [ 1665.546998] name failslab, interval 1, probability 0, space 0, times 0 [ 1665.550895] CPU: 1 PID: 10532 Comm: syz-executor.3 Not tainted 5.10.230 #1 [ 1665.552503] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1665.554338] Call Trace: [ 1665.554947] dump_stack+0x107/0x167 [ 1665.555795] should_fail.cold+0x5/0xa [ 1665.556694] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1665.558051] should_failslab+0x5/0x20 [ 1665.558914] kmem_cache_alloc+0x5b/0x310 [ 1665.559852] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1665.561131] idr_get_free+0x4b5/0x8f0 [ 1665.562023] idr_alloc_u32+0x170/0x2d0 [ 1665.562922] ? __fprop_inc_percpu_max+0x130/0x130 [ 1665.564034] ? lock_acquire+0x197/0x470 [ 1665.564936] ? __kernfs_new_node+0xff/0x860 [ 1665.565977] idr_alloc_cyclic+0x102/0x230 [ 1665.566958] ? idr_alloc+0x130/0x130 [ 1665.567831] ? rwlock_bug.part.0+0x90/0x90 [ 1665.568845] __kernfs_new_node+0x117/0x860 [ 1665.569870] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1665.571003] ? lock_chain_count+0x20/0x20 [ 1665.572005] ? update_load_avg+0x162/0x1870 [ 1665.573034] ? find_held_lock+0x2c/0x110 [ 1665.573987] kernfs_new_node+0x18d/0x250 [ 1665.574878] kernfs_create_dir_ns+0x49/0x160 [ 1665.575911] internal_create_group+0x793/0xb30 [ 1665.577019] ? set_user_nice.part.0+0x2fd/0x760 [ 1665.578145] ? sysfs_remove_group+0x170/0x170 [ 1665.579229] ? lockdep_init_map_type+0x2c7/0x780 [ 1665.580375] ? blk_queue_flag_set+0x22/0x30 [ 1665.581411] ? __loop_update_dio+0x2d2/0x690 [ 1665.582519] loop_configure+0x958/0x1490 [ 1665.583521] lo_ioctl+0xa72/0x1760 [ 1665.584387] ? avc_has_extended_perms+0x7f1/0xf40 [ 1665.585571] ? loop_set_status_old+0x250/0x250 [ 1665.586661] ? avc_ss_reset+0x180/0x180 [ 1665.587631] ? find_held_lock+0x2c/0x110 [ 1665.588507] ? __lock_acquire+0xbb1/0x5b00 [ 1665.589581] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1665.590830] ? generic_block_fiemap+0x60/0x60 [ 1665.591926] ? lock_downgrade+0x6d0/0x6d0 [ 1665.592921] ? build_open_flags+0x6f0/0x6f0 [ 1665.593997] ? loop_set_status_old+0x250/0x250 [ 1665.595085] blkdev_ioctl+0x291/0x710 [ 1665.595993] ? blkdev_common_ioctl+0x1930/0x1930 [ 1665.597077] ? selinux_file_ioctl+0xb6/0x270 [ 1665.598330] block_ioctl+0xf9/0x140 [ 1665.599211] ? blkdev_read_iter+0x1c0/0x1c0 [ 1665.600282] __x64_sys_ioctl+0x19a/0x210 [ 1665.601278] do_syscall_64+0x33/0x40 [ 1665.602157] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1665.603239] RIP: 0033:0x7fcc93e048d7 [ 1665.604032] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1665.607914] RSP: 002b:00007fcc91379f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1665.609541] RAX: ffffffffffffffda RBX: 00007fcc93e4e970 RCX: 00007fcc93e048d7 [ 1665.611063] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1665.612584] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 1665.614128] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1665.615661] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 22:05:21 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 24) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:05:21 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce40", 0xb2}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1665.685852] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:05:21 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 58) [ 1665.722802] FAULT_INJECTION: forcing a failure. [ 1665.722802] name failslab, interval 1, probability 0, space 0, times 0 [ 1665.725351] CPU: 0 PID: 10546 Comm: syz-executor.7 Not tainted 5.10.230 #1 [ 1665.726817] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1665.728590] Call Trace: [ 1665.729154] dump_stack+0x107/0x167 [ 1665.729938] should_fail.cold+0x5/0xa [ 1665.730750] ? create_object.isra.0+0x3a/0xa20 [ 1665.731731] should_failslab+0x5/0x20 [ 1665.732542] kmem_cache_alloc+0x5b/0x310 [ 1665.732603] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1665.733411] ? __generic_file_write_iter+0x1a4/0x5d0 [ 1665.733434] create_object.isra.0+0x3a/0xa20 [ 1665.733449] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1665.733472] kmem_cache_alloc+0x159/0x310 [ 1665.733489] ? new_sync_write+0x499/0x660 [ 1665.733511] getname_flags.part.0+0x50/0x4f0 [ 1665.733540] getname+0x8e/0xd0 [ 1665.733559] do_sys_openat2+0xf9/0x4d0 [ 1665.733579] ? build_open_flags+0x6f0/0x6f0 [ 1665.733608] ? rcu_read_lock_any_held+0x75/0xa0 [ 1665.744647] __x64_sys_openat+0x13f/0x1f0 [ 1665.745530] ? __ia32_sys_open+0x1c0/0x1c0 [ 1665.746444] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1665.747564] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1665.748658] do_syscall_64+0x33/0x40 [ 1665.749453] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1665.750547] RIP: 0033:0x7f3576635a04 22:05:21 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 16) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1665.751337] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1665.755378] RSP: 002b:00007f3573bf7ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1665.756918] RAX: ffffffffffffffda RBX: 00007f35766cc970 RCX: 00007f3576635a04 [ 1665.758374] RDX: 0000000000000002 RSI: 00007f3573bf8000 RDI: 00000000ffffff9c [ 1665.759816] RBP: 00007f3573bf8000 R08: 0000000000000000 R09: ffffffffffffffff [ 1665.761258] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1665.762710] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1665.771942] FAULT_INJECTION: forcing a failure. [ 1665.771942] name failslab, interval 1, probability 0, space 0, times 0 [ 1665.774554] CPU: 0 PID: 10550 Comm: syz-executor.4 Not tainted 5.10.230 #1 [ 1665.775963] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1665.777653] Call Trace: [ 1665.778182] dump_stack+0x107/0x167 [ 1665.778923] should_fail.cold+0x5/0xa [ 1665.779698] ? __alloc_file+0x21/0x320 [ 1665.780501] should_failslab+0x5/0x20 [ 1665.781287] kmem_cache_alloc+0x5b/0x310 [ 1665.782143] __alloc_file+0x21/0x320 [ 1665.782910] alloc_empty_file+0x6d/0x170 [ 1665.783739] path_openat+0xe6/0x2770 [ 1665.784518] ? __lock_acquire+0x1657/0x5b00 [ 1665.785409] ? path_lookupat+0x860/0x860 [ 1665.786266] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1665.787340] ? lock_acquire+0x197/0x470 [ 1665.788167] ? find_held_lock+0x2c/0x110 [ 1665.789014] do_filp_open+0x190/0x3e0 [ 1665.789821] ? may_open_dev+0xf0/0xf0 [ 1665.790598] ? alloc_fd+0x2e7/0x670 [ 1665.791358] ? lock_downgrade+0x6d0/0x6d0 [ 1665.792209] ? do_raw_spin_lock+0x121/0x260 [ 1665.793113] ? rwlock_bug.part.0+0x90/0x90 [ 1665.793996] ? _raw_spin_unlock+0x1a/0x30 [ 1665.794861] ? alloc_fd+0x2e7/0x670 [ 1665.795620] do_sys_openat2+0x171/0x4d0 [ 1665.796459] ? build_open_flags+0x6f0/0x6f0 [ 1665.797344] ? rcu_read_lock_any_held+0x75/0xa0 [ 1665.798328] __x64_sys_openat+0x13f/0x1f0 [ 1665.799167] ? __ia32_sys_open+0x1c0/0x1c0 [ 1665.800064] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1665.801137] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1665.802223] do_syscall_64+0x33/0x40 [ 1665.802991] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1665.804026] RIP: 0033:0x7f50ad793a04 [ 1665.804779] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1665.808523] RSP: 002b:00007f50aad55ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1665.810081] RAX: ffffffffffffffda RBX: 00007f50ad82a970 RCX: 00007f50ad793a04 [ 1665.811535] RDX: 0000000000000002 RSI: 00007f50aad56000 RDI: 00000000ffffff9c [ 1665.812976] RBP: 00007f50aad56000 R08: 0000000000000000 R09: ffffffffffffffff [ 1665.814433] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1665.815937] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 22:05:21 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 33) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:05:21 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 25) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) [ 1665.868803] FAULT_INJECTION: forcing a failure. [ 1665.868803] name failslab, interval 1, probability 0, space 0, times 0 [ 1665.871337] CPU: 0 PID: 10555 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1665.872561] FAULT_INJECTION: forcing a failure. [ 1665.872561] name failslab, interval 1, probability 0, space 0, times 0 [ 1665.872804] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1665.872820] Call Trace: [ 1665.877447] dump_stack+0x107/0x167 [ 1665.878209] should_fail.cold+0x5/0xa [ 1665.878995] ? xas_alloc+0x336/0x440 [ 1665.879773] should_failslab+0x5/0x20 [ 1665.880571] kmem_cache_alloc+0x5b/0x310 [ 1665.881415] xas_alloc+0x336/0x440 [ 1665.882172] xas_create+0x34a/0x10d0 [ 1665.882960] ? kernel_text_address+0xf2/0x120 [ 1665.883910] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1665.884996] xas_store+0x8c/0x1c40 [ 1665.885748] __xa_store+0x164/0x2d0 [ 1665.886520] ? xa_delete_node+0x280/0x280 [ 1665.887394] ? trace_hardirqs_on+0x5b/0x180 [ 1665.888283] xa_store+0x31/0x50 [ 1665.888960] __io_uring_add_tctx_node+0x1cf/0x520 [ 1665.889961] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1665.891041] ? alloc_fd+0x2e7/0x670 [ 1665.891795] io_uring_setup+0x1fbb/0x2980 [ 1665.892656] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1665.893717] ? wait_for_completion_io+0x270/0x270 [ 1665.894726] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1665.895773] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1665.896823] do_syscall_64+0x33/0x40 [ 1665.897590] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1665.898630] RIP: 0033:0x7fcc97c5ab19 [ 1665.899385] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1665.903124] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1665.904671] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1665.906124] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1665.907569] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1665.909015] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1665.910469] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1665.911952] CPU: 1 PID: 10558 Comm: syz-executor.4 Not tainted 5.10.230 #1 [ 1665.913429] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1665.915192] Call Trace: [ 1665.915756] dump_stack+0x107/0x167 [ 1665.916522] should_fail.cold+0x5/0xa [ 1665.917325] ? create_object.isra.0+0x3a/0xa20 [ 1665.918305] should_failslab+0x5/0x20 [ 1665.919097] kmem_cache_alloc+0x5b/0x310 [ 1665.919958] create_object.isra.0+0x3a/0xa20 [ 1665.920880] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1665.921962] kmem_cache_alloc+0x159/0x310 [ 1665.922837] __alloc_file+0x21/0x320 [ 1665.923619] alloc_empty_file+0x6d/0x170 [ 1665.924472] path_openat+0xe6/0x2770 [ 1665.925258] ? __lock_acquire+0x1657/0x5b00 [ 1665.926198] ? path_lookupat+0x860/0x860 [ 1665.927047] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1665.928148] ? lock_acquire+0x197/0x470 [ 1665.928983] ? find_held_lock+0x2c/0x110 [ 1665.929858] do_filp_open+0x190/0x3e0 [ 1665.930655] ? may_open_dev+0xf0/0xf0 [ 1665.931453] ? alloc_fd+0x2e7/0x670 [ 1665.932231] ? lock_downgrade+0x6d0/0x6d0 [ 1665.933107] ? do_raw_spin_lock+0x121/0x260 [ 1665.934019] ? rwlock_bug.part.0+0x90/0x90 [ 1665.934912] ? _raw_spin_unlock+0x1a/0x30 [ 1665.935778] ? alloc_fd+0x2e7/0x670 [ 1665.936551] do_sys_openat2+0x171/0x4d0 [ 1665.937393] ? build_open_flags+0x6f0/0x6f0 [ 1665.938312] ? rcu_read_lock_any_held+0x75/0xa0 [ 1665.939285] __x64_sys_openat+0x13f/0x1f0 [ 1665.940163] ? __ia32_sys_open+0x1c0/0x1c0 [ 1665.941060] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1665.942175] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1665.943256] do_syscall_64+0x33/0x40 [ 1665.944036] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1665.945110] RIP: 0033:0x7f50ad793a04 22:05:21 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) [ 1665.945905] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1665.949969] RSP: 002b:00007f50aad55ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1665.951562] RAX: ffffffffffffffda RBX: 00007f50ad82a970 RCX: 00007f50ad793a04 [ 1665.953053] RDX: 0000000000000002 RSI: 00007f50aad56000 RDI: 00000000ffffff9c [ 1665.954567] RBP: 00007f50aad56000 R08: 0000000000000000 R09: ffffffffffffffff [ 1665.956052] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1665.957549] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 22:05:21 executing program 6: getpgid(0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x22902, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_io_uring_complete(0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x5d, 0x0, @thr={&(0x7f00000002c0)="c58435b56fadce6925a8c5ef8299d1c9436890996f121c55fd3949c7ffe74e562d5b7ad3ba81ec2ee03296fc177baf9eb677c3b886f2d2f6f15bbb7648f001000000a7e1de93ae4056fd27712f2d24552e5d7d39ec16e048786d22b4989871bad0f0ee169831b6e6f3e5f6aec27d337087b8119f6d755f6e40547c31e63fdaf4b4593725c72c370172c9527216a415009b28cfab12175e4c530e215b70f7b654b1cc73e9eabfb340bcf589b70ae5e8acd00b6770b80a2a135bf9bd68f3679d8a46b4c50a69d29136daef4804fe9cb5f8caceaeb2b7310d7154d547c522215a4a59b9787a63c4e818bd23c5668aa30f9e030613", &(0x7f0000000540)="2ac7a21c8555cb8161df3e647dcdb023da28a1a647a16e4f8e6fa8febca24d45c7a3d99bb9f57cbd2a9300e181ca7c1e21a348b0080a5409b2a4e4d827024c7bc481ad488ef6fded915ad2c221d17d526fba95e126bf2c8f45e164040e2fc26125b81d"}}, &(0x7f0000000180)) r1 = socket$netlink(0x10, 0x3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000080)=""/200, 0x20000148}], 0x1, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000003c0)=""/101, 0x65) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000240), &(0x7f0000000440)={'L-', 0x3}, 0x16, 0x3) [ 1665.988816] FAULT_INJECTION: forcing a failure. [ 1665.988816] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1665.991493] CPU: 1 PID: 10564 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1665.992928] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1665.994676] Call Trace: [ 1665.995235] dump_stack+0x107/0x167 [ 1665.996004] should_fail.cold+0x5/0xa [ 1665.996810] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 1665.997942] ? shmem_write_begin+0xf7/0x1d0 [ 1665.998839] ? shmem_write_begin+0x100/0x1d0 [ 1665.999758] generic_perform_write+0x279/0x4f0 [ 1666.000719] ? page_cache_prev_miss+0x310/0x310 [ 1666.001703] ? evict_inodes+0x470/0x470 [ 1666.002536] ? generic_write_checks+0x2ad/0x390 [ 1666.003512] __generic_file_write_iter+0x39d/0x5d0 [ 1666.004554] generic_file_write_iter+0xdb/0x230 [ 1666.005523] ? iov_iter_init+0x3c/0x130 [ 1666.006374] new_sync_write+0x42c/0x660 [ 1666.007210] ? new_sync_read+0x6f0/0x6f0 [ 1666.008061] ? __x64_sys_pwrite64+0x201/0x260 [ 1666.009010] ? lock_release+0x680/0x680 [ 1666.009858] ? selinux_file_permission+0x92/0x520 [ 1666.010866] ? security_file_permission+0xb1/0xe0 [ 1666.011877] vfs_write+0x7c0/0xb10 [ 1666.012627] __x64_sys_pwrite64+0x201/0x260 [ 1666.013544] ? ksys_pwrite64+0x1b0/0x1b0 [ 1666.014394] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1666.015482] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1666.016562] do_syscall_64+0x33/0x40 [ 1666.017337] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1666.018418] RIP: 0033:0x7f3e51918ab7 [ 1666.019190] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1666.023023] RSP: 002b:00007f3e4eedaf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1666.024605] RAX: ffffffffffffffda RBX: 00007f3e519af970 RCX: 00007f3e51918ab7 [ 1666.026102] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000005 [ 1666.027584] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1666.029068] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000005 [ 1666.030566] R13: 0000000000000005 R14: 0000000020000488 R15: 0000000000000003 [ 1666.044615] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1666.055522] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:05:21 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138", 0xbf}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:05:22 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:05:22 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) 22:05:22 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 59) 22:05:22 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 26) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) [ 1666.164637] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1666.208572] FAULT_INJECTION: forcing a failure. [ 1666.208572] name failslab, interval 1, probability 0, space 0, times 0 [ 1666.211105] CPU: 1 PID: 10581 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1666.212570] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1666.214315] Call Trace: [ 1666.214882] dump_stack+0x107/0x167 [ 1666.215666] should_fail.cold+0x5/0xa [ 1666.216486] ? ___slab_alloc+0x155/0x700 [ 1666.217357] ? create_object.isra.0+0x3a/0xa20 [ 1666.218354] should_failslab+0x5/0x20 [ 1666.219169] kmem_cache_alloc+0x5b/0x310 [ 1666.220052] create_object.isra.0+0x3a/0xa20 [ 1666.220995] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1666.222099] kmem_cache_alloc+0x159/0x310 [ 1666.222999] xas_alloc+0x336/0x440 [ 1666.223765] xas_create+0x34a/0x10d0 [ 1666.224577] ? kernel_text_address+0xf2/0x120 [ 1666.225567] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1666.226697] xas_store+0x8c/0x1c40 [ 1666.227476] __xa_store+0x164/0x2d0 [ 1666.228259] ? xa_delete_node+0x280/0x280 [ 1666.229157] ? trace_hardirqs_on+0x5b/0x180 [ 1666.230101] xa_store+0x31/0x50 [ 1666.230817] __io_uring_add_tctx_node+0x1cf/0x520 [ 1666.231862] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1666.232989] ? alloc_fd+0x2e7/0x670 [ 1666.233793] io_uring_setup+0x1fbb/0x2980 [ 1666.234692] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1666.235786] ? wait_for_completion_io+0x270/0x270 [ 1666.236848] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1666.237990] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1666.239106] do_syscall_64+0x33/0x40 [ 1666.239905] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1666.241007] RIP: 0033:0x7fcc97c5ab19 [ 1666.241816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1666.245801] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1666.247440] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1666.248973] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1666.250519] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1666.252054] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1666.253603] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1666.278916] FAULT_INJECTION: forcing a failure. [ 1666.278916] name failslab, interval 1, probability 0, space 0, times 0 [ 1666.281551] CPU: 1 PID: 10585 Comm: syz-executor.4 Not tainted 5.10.230 #1 [ 1666.283019] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1666.284764] Call Trace: [ 1666.285314] dump_stack+0x107/0x167 [ 1666.286084] should_fail.cold+0x5/0xa [ 1666.286881] ? security_file_alloc+0x34/0x170 [ 1666.287834] should_failslab+0x5/0x20 [ 1666.288628] kmem_cache_alloc+0x5b/0x310 [ 1666.289505] security_file_alloc+0x34/0x170 [ 1666.290422] __alloc_file+0xb7/0x320 [ 1666.291199] alloc_empty_file+0x6d/0x170 [ 1666.292049] path_openat+0xe6/0x2770 [ 1666.292826] ? __lock_acquire+0x1657/0x5b00 [ 1666.293753] ? path_lookupat+0x860/0x860 [ 1666.294603] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1666.295699] ? lock_acquire+0x197/0x470 [ 1666.296535] ? find_held_lock+0x2c/0x110 [ 1666.297393] do_filp_open+0x190/0x3e0 [ 1666.298199] ? may_open_dev+0xf0/0xf0 [ 1666.298998] ? alloc_fd+0x2e7/0x670 [ 1666.299760] ? lock_downgrade+0x6d0/0x6d0 [ 1666.300629] ? do_raw_spin_lock+0x121/0x260 [ 1666.301554] ? rwlock_bug.part.0+0x90/0x90 [ 1666.302446] ? _raw_spin_unlock+0x1a/0x30 [ 1666.303308] ? alloc_fd+0x2e7/0x670 [ 1666.304084] do_sys_openat2+0x171/0x4d0 [ 1666.304920] ? build_open_flags+0x6f0/0x6f0 [ 1666.305849] ? rcu_read_lock_any_held+0x75/0xa0 [ 1666.306840] __x64_sys_openat+0x13f/0x1f0 [ 1666.307712] ? __ia32_sys_open+0x1c0/0x1c0 [ 1666.308608] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1666.309715] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1666.310793] do_syscall_64+0x33/0x40 [ 1666.311578] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1666.312671] RIP: 0033:0x7f50ad793a04 [ 1666.313450] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1666.317307] RSP: 002b:00007f50aad55ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1666.318913] RAX: ffffffffffffffda RBX: 00007f50ad82a970 RCX: 00007f50ad793a04 [ 1666.320412] RDX: 0000000000000002 RSI: 00007f50aad56000 RDI: 00000000ffffff9c [ 1666.321932] RBP: 00007f50aad56000 R08: 0000000000000000 R09: ffffffffffffffff [ 1666.323445] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1666.324941] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 22:05:36 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 23) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:05:36 executing program 6: getpgid(0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x22902, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_io_uring_complete(0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x5d, 0x0, @thr={&(0x7f00000002c0)="c58435b56fadce6925a8c5ef8299d1c9436890996f121c55fd3949c7ffe74e562d5b7ad3ba81ec2ee03296fc177baf9eb677c3b886f2d2f6f15bbb7648f001000000a7e1de93ae4056fd27712f2d24552e5d7d39ec16e048786d22b4989871bad0f0ee169831b6e6f3e5f6aec27d337087b8119f6d755f6e40547c31e63fdaf4b4593725c72c370172c9527216a415009b28cfab12175e4c530e215b70f7b654b1cc73e9eabfb340bcf589b70ae5e8acd00b6770b80a2a135bf9bd68f3679d8a46b4c50a69d29136daef4804fe9cb5f8caceaeb2b7310d7154d547c522215a4a59b9787a63c4e818bd23c5668aa30f9e030613", &(0x7f0000000540)="2ac7a21c8555cb8161df3e647dcdb023da28a1a647a16e4f8e6fa8febca24d45c7a3d99bb9f57cbd2a9300e181ca7c1e21a348b0080a5409b2a4e4d827024c7bc481ad488ef6fded915ad2c221d17d526fba95e126bf2c8f45e164040e2fc26125b81d14d34a97df6efce3e5b87ef010bd0fd8fd"}}, &(0x7f0000000180)) r1 = socket$netlink(0x10, 0x3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000080)=""/200, 0x20000148}], 0x1, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000003c0)=""/101, 0x65) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000240), &(0x7f0000000440)={'L-', 0x3}, 0x16, 0x3) 22:05:36 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 27) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:05:36 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 60) 22:05:36 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 17) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1680.478288] FAULT_INJECTION: forcing a failure. [ 1680.478288] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1680.480374] FAULT_INJECTION: forcing a failure. [ 1680.480374] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1680.481226] CPU: 1 PID: 10592 Comm: syz-executor.7 Not tainted 5.10.230 #1 [ 1680.483668] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1680.485422] Call Trace: [ 1680.485982] dump_stack+0x107/0x167 [ 1680.486776] should_fail.cold+0x5/0xa [ 1680.487588] strncpy_from_user+0x34/0x470 [ 1680.488469] getname_flags.part.0+0x95/0x4f0 [ 1680.489408] getname+0x8e/0xd0 [ 1680.490098] do_sys_openat2+0xf9/0x4d0 [ 1680.490917] ? recalibrate_cpu_khz+0x10/0x10 [ 1680.491848] ? ktime_get+0x158/0x1f0 [ 1680.492637] ? build_open_flags+0x6f0/0x6f0 [ 1680.493549] ? clockevents_program_event+0x131/0x360 [ 1680.494632] ? tick_program_event+0xa8/0x140 [ 1680.495573] __x64_sys_openat+0x13f/0x1f0 [ 1680.496443] ? __ia32_sys_open+0x1c0/0x1c0 [ 1680.497344] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1680.498459] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1680.499556] do_syscall_64+0x33/0x40 [ 1680.500338] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1680.501430] RIP: 0033:0x7f3576635a04 [ 1680.502226] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1680.506097] RSP: 002b:00007f3573bf7ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1680.507705] RAX: ffffffffffffffda RBX: 00007f35766cc970 RCX: 00007f3576635a04 [ 1680.509206] RDX: 0000000000000002 RSI: 00007f3573bf8000 RDI: 00000000ffffff9c [ 1680.510711] RBP: 00007f3573bf8000 R08: 0000000000000000 R09: ffffffffffffffff [ 1680.512213] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1680.513709] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1680.515242] CPU: 0 PID: 10595 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1680.516117] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1680.517140] Call Trace: [ 1680.517487] dump_stack+0x107/0x167 [ 1680.517941] should_fail.cold+0x5/0xa [ 1680.518422] __alloc_pages_nodemask+0x182/0x600 [ 1680.518995] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1680.519727] ? lock_downgrade+0x6d0/0x6d0 [ 1680.520233] ? lock_acquire+0x197/0x470 [ 1680.520488] FAULT_INJECTION: forcing a failure. [ 1680.520488] name failslab, interval 1, probability 0, space 0, times 0 [ 1680.520745] alloc_pages_vma+0xbb/0x410 [ 1680.523535] shmem_alloc_page+0x10f/0x1e0 [ 1680.524044] ? shmem_init_inode+0x20/0x20 [ 1680.524577] ? percpu_counter_add_batch+0x8b/0x140 [ 1680.525184] ? __vm_enough_memory+0x184/0x360 [ 1680.525730] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 1680.526415] ? shmem_unuse_inode+0xf60/0xf60 [ 1680.526988] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1680.527656] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1680.528336] shmem_write_begin+0xf7/0x1d0 [ 1680.528881] generic_perform_write+0x20a/0x4f0 [ 1680.529481] ? page_cache_prev_miss+0x310/0x310 [ 1680.530083] ? evict_inodes+0x470/0x470 [ 1680.530604] ? generic_write_checks+0x2ad/0x390 [ 1680.531223] __generic_file_write_iter+0x39d/0x5d0 [ 1680.531869] generic_file_write_iter+0xdb/0x230 [ 1680.532482] ? iov_iter_init+0x3c/0x130 [ 1680.532998] new_sync_write+0x42c/0x660 [ 1680.533512] ? new_sync_read+0x6f0/0x6f0 [ 1680.534051] ? __x64_sys_pwrite64+0x201/0x260 [ 1680.534629] ? lock_release+0x680/0x680 [ 1680.535155] ? selinux_file_permission+0x92/0x520 [ 1680.535790] ? security_file_permission+0xb1/0xe0 [ 1680.536414] vfs_write+0x7c0/0xb10 [ 1680.536893] __x64_sys_pwrite64+0x201/0x260 [ 1680.537448] ? ksys_pwrite64+0x1b0/0x1b0 [ 1680.537974] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1680.538678] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1680.539343] do_syscall_64+0x33/0x40 [ 1680.539829] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1680.540499] RIP: 0033:0x7f3e51918ab7 [ 1680.540972] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1680.543334] RSP: 002b:00007f3e4eedaf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1680.544326] RAX: ffffffffffffffda RBX: 00007f3e519af970 RCX: 00007f3e51918ab7 [ 1680.545256] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000005 [ 1680.546203] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1680.547099] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000005 [ 1680.548010] R13: 0000000000000005 R14: 00000000200004a0 R15: 0000000000000004 [ 1680.548937] CPU: 1 PID: 10600 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1680.550400] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1680.552120] Call Trace: [ 1680.552668] dump_stack+0x107/0x167 [ 1680.553425] should_fail.cold+0x5/0xa [ 1680.554227] ? xas_alloc+0x336/0x440 [ 1680.555004] should_failslab+0x5/0x20 [ 1680.555804] kmem_cache_alloc+0x5b/0x310 [ 1680.556660] xas_alloc+0x336/0x440 [ 1680.557414] xas_create+0x34a/0x10d0 [ 1680.558224] ? kernel_text_address+0xf2/0x120 [ 1680.559173] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1680.560278] xas_store+0x8c/0x1c40 [ 1680.561033] __xa_store+0x164/0x2d0 [ 1680.561798] ? xa_delete_node+0x280/0x280 [ 1680.562681] ? trace_hardirqs_on+0x5b/0x180 [ 1680.563592] xa_store+0x31/0x50 22:05:36 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:05:36 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138", 0xbf}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:05:36 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) [ 1680.564454] __io_uring_add_tctx_node+0x1cf/0x520 [ 1680.565573] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1680.566681] ? alloc_fd+0x2e7/0x670 [ 1680.567465] io_uring_setup+0x1fbb/0x2980 [ 1680.568347] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1680.569410] ? wait_for_completion_io+0x270/0x270 [ 1680.570454] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1680.571558] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1680.572635] do_syscall_64+0x33/0x40 [ 1680.573414] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1680.574502] RIP: 0033:0x7fcc97c5ab19 [ 1680.575277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1680.579127] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1680.580713] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1680.582205] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1680.583710] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1680.585198] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1680.586699] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1680.600922] FAULT_INJECTION: forcing a failure. [ 1680.600922] name failslab, interval 1, probability 0, space 0, times 0 [ 1680.602436] CPU: 0 PID: 10610 Comm: syz-executor.4 Not tainted 5.10.230 #1 [ 1680.603283] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1680.604286] Call Trace: [ 1680.604609] dump_stack+0x107/0x167 [ 1680.605054] should_fail.cold+0x5/0xa [ 1680.605514] ? create_object.isra.0+0x3a/0xa20 [ 1680.606075] should_failslab+0x5/0x20 [ 1680.606553] kmem_cache_alloc+0x5b/0x310 [ 1680.607047] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1680.607710] create_object.isra.0+0x3a/0xa20 [ 1680.608239] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1680.608848] kmem_cache_alloc+0x159/0x310 [ 1680.609351] security_file_alloc+0x34/0x170 [ 1680.609869] __alloc_file+0xb7/0x320 [ 1680.610326] alloc_empty_file+0x6d/0x170 [ 1680.610813] path_openat+0xe6/0x2770 [ 1680.611259] ? __lock_acquire+0x1657/0x5b00 [ 1680.611787] ? path_lookupat+0x860/0x860 [ 1680.612287] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1680.612920] ? lock_acquire+0x197/0x470 [ 1680.613395] ? find_held_lock+0x2c/0x110 [ 1680.613888] do_filp_open+0x190/0x3e0 [ 1680.614349] ? may_open_dev+0xf0/0xf0 [ 1680.614813] ? alloc_fd+0x2e7/0x670 [ 1680.615252] ? lock_downgrade+0x6d0/0x6d0 [ 1680.615759] ? do_raw_spin_lock+0x121/0x260 [ 1680.616279] ? rwlock_bug.part.0+0x90/0x90 [ 1680.616797] ? _raw_spin_unlock+0x1a/0x30 [ 1680.617299] ? alloc_fd+0x2e7/0x670 [ 1680.617742] do_sys_openat2+0x171/0x4d0 [ 1680.618233] ? build_open_flags+0x6f0/0x6f0 [ 1680.618763] ? rcu_read_lock_any_held+0x75/0xa0 [ 1680.619322] __x64_sys_openat+0x13f/0x1f0 [ 1680.619822] ? __ia32_sys_open+0x1c0/0x1c0 [ 1680.620343] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1680.620974] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1680.621594] do_syscall_64+0x33/0x40 [ 1680.622046] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1680.622656] RIP: 0033:0x7f50ad793a04 [ 1680.623098] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1680.625290] RSP: 002b:00007f50aad55ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1680.626206] RAX: ffffffffffffffda RBX: 00007f50ad82a970 RCX: 00007f50ad793a04 [ 1680.627056] RDX: 0000000000000002 RSI: 00007f50aad56000 RDI: 00000000ffffff9c [ 1680.627908] RBP: 00007f50aad56000 R08: 0000000000000000 R09: ffffffffffffffff [ 1680.628758] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1680.629614] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 22:05:36 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138", 0xbf}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1680.668220] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:05:36 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 24) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1680.684831] FAULT_INJECTION: forcing a failure. [ 1680.684831] name failslab, interval 1, probability 0, space 0, times 0 [ 1680.686323] CPU: 0 PID: 10623 Comm: syz-executor.7 Not tainted 5.10.230 #1 [ 1680.687157] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1680.688147] Call Trace: [ 1680.688469] dump_stack+0x107/0x167 [ 1680.688913] should_fail.cold+0x5/0xa [ 1680.689370] ? __alloc_file+0x21/0x320 [ 1680.689843] should_failslab+0x5/0x20 [ 1680.690310] kmem_cache_alloc+0x5b/0x310 [ 1680.690805] __alloc_file+0x21/0x320 [ 1680.691253] alloc_empty_file+0x6d/0x170 [ 1680.691739] path_openat+0xe6/0x2770 [ 1680.692169] ? __lock_acquire+0x1657/0x5b00 [ 1680.692693] ? path_lookupat+0x860/0x860 [ 1680.693152] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1680.693773] ? lock_acquire+0x197/0x470 [ 1680.694231] ? find_held_lock+0x2c/0x110 [ 1680.694725] do_filp_open+0x190/0x3e0 [ 1680.695154] ? may_open_dev+0xf0/0xf0 [ 1680.695613] ? alloc_fd+0x2e7/0x670 [ 1680.696032] ? lock_downgrade+0x6d0/0x6d0 [ 1680.696529] ? do_raw_spin_lock+0x121/0x260 [ 1680.697044] ? rwlock_bug.part.0+0x90/0x90 [ 1680.697538] ? _raw_spin_unlock+0x1a/0x30 [ 1680.698041] ? alloc_fd+0x2e7/0x670 [ 1680.698473] do_sys_openat2+0x171/0x4d0 [ 1680.698956] ? build_open_flags+0x6f0/0x6f0 [ 1680.699458] ? rcu_read_lock_any_held+0x75/0xa0 [ 1680.700015] __x64_sys_openat+0x13f/0x1f0 [ 1680.700487] ? __ia32_sys_open+0x1c0/0x1c0 [ 1680.701006] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1680.701609] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1680.702240] do_syscall_64+0x33/0x40 [ 1680.702674] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1680.703278] RIP: 0033:0x7f3576635a04 [ 1680.703707] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1680.705878] RSP: 002b:00007f3573bf7ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1680.706818] RAX: ffffffffffffffda RBX: 00007f35766cc970 RCX: 00007f3576635a04 [ 1680.707656] RDX: 0000000000000002 RSI: 00007f3573bf8000 RDI: 00000000ffffff9c [ 1680.708493] RBP: 00007f3573bf8000 R08: 0000000000000000 R09: ffffffffffffffff [ 1680.709341] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1680.710190] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1680.746223] EXT4-fs error (device loop1): ext4_fill_super:4967: inode #2: comm syz-executor.1: iget: special inode unallocated [ 1680.749746] EXT4-fs (loop1): get root inode failed [ 1680.750936] EXT4-fs (loop1): mount failed [ 1680.759741] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:05:36 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1680.808733] FAULT_INJECTION: forcing a failure. [ 1680.808733] name failslab, interval 1, probability 0, space 0, times 0 [ 1680.810257] CPU: 0 PID: 10634 Comm: syz-executor.7 Not tainted 5.10.230 #1 [ 1680.811050] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1680.811991] Call Trace: [ 1680.812294] dump_stack+0x107/0x167 [ 1680.812707] should_fail.cold+0x5/0xa [ 1680.813147] ? create_object.isra.0+0x3a/0xa20 [ 1680.813670] should_failslab+0x5/0x20 [ 1680.814116] kmem_cache_alloc+0x5b/0x310 [ 1680.814579] create_object.isra.0+0x3a/0xa20 [ 1680.815081] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1680.815658] kmem_cache_alloc+0x159/0x310 [ 1680.816130] __alloc_file+0x21/0x320 [ 1680.816551] alloc_empty_file+0x6d/0x170 [ 1680.817013] path_openat+0xe6/0x2770 [ 1680.817441] ? __lock_acquire+0x1657/0x5b00 [ 1680.817933] ? path_lookupat+0x860/0x860 [ 1680.818411] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1680.819002] ? lock_acquire+0x197/0x470 [ 1680.819453] ? find_held_lock+0x2c/0x110 [ 1680.819920] do_filp_open+0x190/0x3e0 [ 1680.820346] ? may_open_dev+0xf0/0xf0 [ 1680.820778] ? alloc_fd+0x2e7/0x670 [ 1680.821190] ? lock_downgrade+0x6d0/0x6d0 [ 1680.821662] ? do_raw_spin_lock+0x121/0x260 [ 1680.822153] ? rwlock_bug.part.0+0x90/0x90 [ 1680.822641] ? _raw_spin_unlock+0x1a/0x30 [ 1680.823107] ? alloc_fd+0x2e7/0x670 [ 1680.823528] do_sys_openat2+0x171/0x4d0 [ 1680.823980] ? build_open_flags+0x6f0/0x6f0 [ 1680.824480] ? rcu_read_lock_any_held+0x75/0xa0 [ 1680.825012] __x64_sys_openat+0x13f/0x1f0 [ 1680.825480] ? __ia32_sys_open+0x1c0/0x1c0 [ 1680.825968] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1680.826568] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1680.827165] do_syscall_64+0x33/0x40 [ 1680.827583] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1680.828172] RIP: 0033:0x7f3576635a04 [ 1680.828600] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1680.830704] RSP: 002b:00007f3573bf7ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1680.831573] RAX: ffffffffffffffda RBX: 00007f35766cc970 RCX: 00007f3576635a04 [ 1680.832392] RDX: 0000000000000002 RSI: 00007f3573bf8000 RDI: 00000000ffffff9c [ 1680.833203] RBP: 00007f3573bf8000 R08: 0000000000000000 R09: ffffffffffffffff [ 1680.834021] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1680.834837] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 22:05:36 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 25) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:05:36 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, 0xffffffffffffffff, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) 22:05:36 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 61) 22:05:36 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad59", 0xc5}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:05:36 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 18) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:05:36 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 28) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) [ 1680.868848] FAULT_INJECTION: forcing a failure. [ 1680.868848] name failslab, interval 1, probability 0, space 0, times 0 [ 1680.870126] CPU: 0 PID: 10641 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1680.870904] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1680.871851] Call Trace: [ 1680.872163] dump_stack+0x107/0x167 [ 1680.872585] should_fail.cold+0x5/0xa [ 1680.873037] ? xas_alloc+0x336/0x440 [ 1680.873473] should_failslab+0x5/0x20 [ 1680.873911] kmem_cache_alloc+0x5b/0x310 [ 1680.874390] ? trace_hardirqs_on+0x5b/0x180 [ 1680.874890] xas_alloc+0x336/0x440 [ 1680.875310] xas_create+0x60f/0x10d0 [ 1680.875765] xas_create_range+0x189/0x620 [ 1680.876266] shmem_add_to_page_cache+0x760/0x1130 [ 1680.876834] ? shmem_getattr+0x1a0/0x1a0 [ 1680.877324] shmem_getpage_gfp.constprop.0+0x64a/0x1920 [ 1680.877945] ? shmem_unuse_inode+0xf60/0xf60 [ 1680.878466] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1680.879069] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1680.879668] shmem_write_begin+0xf7/0x1d0 [ 1680.880157] generic_perform_write+0x20a/0x4f0 [ 1680.880699] ? page_cache_prev_miss+0x310/0x310 [ 1680.881243] ? evict_inodes+0x470/0x470 [ 1680.881709] ? generic_write_checks+0x2ad/0x390 [ 1680.882271] __generic_file_write_iter+0x39d/0x5d0 [ 1680.882849] generic_file_write_iter+0xdb/0x230 [ 1680.883388] ? iov_iter_init+0x3c/0x130 [ 1680.883854] new_sync_write+0x42c/0x660 [ 1680.884318] ? new_sync_read+0x6f0/0x6f0 [ 1680.884794] ? __x64_sys_pwrite64+0x201/0x260 [ 1680.885322] ? lock_release+0x680/0x680 [ 1680.885790] ? selinux_file_permission+0x92/0x520 [ 1680.886359] ? security_file_permission+0xb1/0xe0 [ 1680.886932] vfs_write+0x7c0/0xb10 [ 1680.887362] __x64_sys_pwrite64+0x201/0x260 [ 1680.887879] ? ksys_pwrite64+0x1b0/0x1b0 [ 1680.888358] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1680.888977] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1680.889582] do_syscall_64+0x33/0x40 [ 1680.890031] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1680.890629] RIP: 0033:0x7f3e51918ab7 [ 1680.891065] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1680.893183] RSP: 002b:00007f3e4eedaf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1680.894076] RAX: ffffffffffffffda RBX: 00007f3e519af970 RCX: 00007f3e51918ab7 [ 1680.894903] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000005 [ 1680.895733] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1680.896550] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000005 [ 1680.897367] R13: 0000000000000005 R14: 00000000200004a0 R15: 0000000000000004 [ 1680.900394] FAULT_INJECTION: forcing a failure. [ 1680.900394] name failslab, interval 1, probability 0, space 0, times 0 [ 1680.901721] CPU: 0 PID: 10639 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1680.902528] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1680.903483] Call Trace: [ 1680.903798] dump_stack+0x107/0x167 [ 1680.904217] should_fail.cold+0x5/0xa [ 1680.904651] ? create_object.isra.0+0x3a/0xa20 [ 1680.905169] should_failslab+0x5/0x20 [ 1680.905601] kmem_cache_alloc+0x5b/0x310 [ 1680.906074] ? mark_held_locks+0x9e/0xe0 [ 1680.906552] create_object.isra.0+0x3a/0xa20 [ 1680.907064] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1680.907654] kmem_cache_alloc+0x159/0x310 [ 1680.908132] xas_alloc+0x336/0x440 [ 1680.908540] xas_create+0x34a/0x10d0 [ 1680.908972] ? kernel_text_address+0xf2/0x120 [ 1680.909480] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1680.910091] xas_store+0x8c/0x1c40 [ 1680.910504] __xa_store+0x164/0x2d0 [ 1680.910922] ? xa_delete_node+0x280/0x280 [ 1680.911397] ? trace_hardirqs_on+0x5b/0x180 [ 1680.911895] xa_store+0x31/0x50 [ 1680.912273] __io_uring_add_tctx_node+0x1cf/0x520 [ 1680.912821] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1680.913415] ? alloc_fd+0x2e7/0x670 [ 1680.913837] io_uring_setup+0x1fbb/0x2980 [ 1680.914323] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1680.914904] ? wait_for_completion_io+0x270/0x270 [ 1680.915466] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1680.916060] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1680.916658] do_syscall_64+0x33/0x40 [ 1680.917084] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1680.917668] RIP: 0033:0x7fcc97c5ab19 [ 1680.918098] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1680.920187] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1680.921056] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1680.921868] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1680.922685] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1680.923496] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1680.924310] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1681.011536] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1681.017246] FAULT_INJECTION: forcing a failure. [ 1681.017246] name failslab, interval 1, probability 0, space 0, times 0 [ 1681.018731] CPU: 0 PID: 10649 Comm: syz-executor.4 Not tainted 5.10.230 #1 [ 1681.019514] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1681.020454] Call Trace: [ 1681.020760] dump_stack+0x107/0x167 [ 1681.021175] should_fail.cold+0x5/0xa [ 1681.021610] ? __kthread_create_on_node+0xd1/0x400 [ 1681.022181] should_failslab+0x5/0x20 [ 1681.022620] kmem_cache_alloc_trace+0x55/0x320 [ 1681.023144] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1681.023691] __kthread_create_on_node+0xd1/0x400 [ 1681.024230] ? __kthread_parkme+0x1d0/0x1d0 [ 1681.024737] ? __mutex_lock+0x4fe/0x10b0 [ 1681.025195] ? loop_configure+0xcb9/0x1490 [ 1681.025684] ? do_raw_spin_unlock+0x4f/0x220 [ 1681.026195] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1681.026731] kthread_create_on_node+0xbb/0x100 [ 1681.027256] ? __kthread_create_on_node+0x400/0x400 [ 1681.027827] ? lockdep_init_map_type+0x2c7/0x780 [ 1681.028378] ? lockdep_init_map_type+0x2c7/0x780 [ 1681.028925] loop_configure+0x3e7/0x1490 [ 1681.029401] lo_ioctl+0xa72/0x1760 [ 1681.029810] ? avc_has_extended_perms+0x7f1/0xf40 [ 1681.030370] ? loop_set_status_old+0x250/0x250 [ 1681.030889] ? avc_ss_reset+0x180/0x180 [ 1681.031343] ? find_held_lock+0x2c/0x110 [ 1681.031818] ? __lock_acquire+0xbb1/0x5b00 [ 1681.032321] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1681.032918] ? generic_block_fiemap+0x60/0x60 [ 1681.033432] ? lock_downgrade+0x6d0/0x6d0 [ 1681.033903] ? build_open_flags+0x6f0/0x6f0 [ 1681.034406] ? loop_set_status_old+0x250/0x250 [ 1681.034925] blkdev_ioctl+0x291/0x710 [ 1681.035359] ? blkdev_common_ioctl+0x1930/0x1930 [ 1681.035898] ? selinux_file_ioctl+0xb6/0x270 [ 1681.036398] block_ioctl+0xf9/0x140 [ 1681.036809] ? blkdev_read_iter+0x1c0/0x1c0 [ 1681.037295] __x64_sys_ioctl+0x19a/0x210 [ 1681.037754] do_syscall_64+0x33/0x40 [ 1681.038179] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1681.038766] RIP: 0033:0x7f50ad7e08d7 [ 1681.039188] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1681.041300] RSP: 002b:00007f50aad55f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1681.042172] RAX: ffffffffffffffda RBX: 00007f50ad82a970 RCX: 00007f50ad7e08d7 [ 1681.042979] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1681.043787] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 1681.044593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1681.045403] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1697.542247] FAULT_INJECTION: forcing a failure. [ 1697.542247] name failslab, interval 1, probability 0, space 0, times 0 [ 1697.542309] FAULT_INJECTION: forcing a failure. [ 1697.542309] name failslab, interval 1, probability 0, space 0, times 0 [ 1697.544855] CPU: 1 PID: 10666 Comm: syz-executor.4 Not tainted 5.10.230 #1 [ 1697.548599] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1697.550363] Call Trace: [ 1697.550944] dump_stack+0x107/0x167 [ 1697.551729] should_fail.cold+0x5/0xa [ 1697.552547] ? create_object.isra.0+0x3a/0xa20 [ 1697.553518] should_failslab+0x5/0x20 [ 1697.554325] kmem_cache_alloc+0x5b/0x310 [ 1697.555206] create_object.isra.0+0x3a/0xa20 [ 1697.556142] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1697.557232] kmem_cache_alloc_trace+0x151/0x320 [ 1697.558230] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1697.559257] __kthread_create_on_node+0xd1/0x400 [ 1697.560272] ? __kthread_parkme+0x1d0/0x1d0 [ 1697.561206] ? __mutex_lock+0x4fe/0x10b0 [ 1697.562074] ? loop_configure+0xcb9/0x1490 [ 1697.562981] ? do_raw_spin_unlock+0x4f/0x220 [ 1697.563922] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1697.564927] kthread_create_on_node+0xbb/0x100 [ 1697.565900] ? __kthread_create_on_node+0x400/0x400 [ 1697.566973] ? lockdep_init_map_type+0x2c7/0x780 [ 1697.567980] ? lockdep_init_map_type+0x2c7/0x780 [ 1697.569000] loop_configure+0x3e7/0x1490 [ 1697.569876] lo_ioctl+0xa72/0x1760 [ 1697.570653] ? avc_has_extended_perms+0x7f1/0xf40 [ 1697.571679] ? loop_set_status_old+0x250/0x250 [ 1697.572650] ? avc_ss_reset+0x180/0x180 [ 1697.573496] ? find_held_lock+0x2c/0x110 [ 1697.574381] ? __lock_acquire+0xbb1/0x5b00 [ 1697.575344] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1697.576464] ? generic_block_fiemap+0x60/0x60 [ 1697.577419] ? lock_downgrade+0x6d0/0x6d0 [ 1697.578304] ? build_open_flags+0x6f0/0x6f0 [ 1697.579242] ? loop_set_status_old+0x250/0x250 [ 1697.580202] blkdev_ioctl+0x291/0x710 [ 1697.581013] ? blkdev_common_ioctl+0x1930/0x1930 [ 1697.582024] ? selinux_file_ioctl+0xb6/0x270 [ 1697.582970] block_ioctl+0xf9/0x140 [ 1697.583743] ? blkdev_read_iter+0x1c0/0x1c0 [ 1697.584661] __x64_sys_ioctl+0x19a/0x210 [ 1697.585523] do_syscall_64+0x33/0x40 [ 1697.586313] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1697.587403] RIP: 0033:0x7f50ad7e08d7 [ 1697.588197] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1697.592069] RSP: 002b:00007f50aad55f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1697.593681] RAX: ffffffffffffffda RBX: 00007f50ad82a970 RCX: 00007f50ad7e08d7 [ 1697.595197] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1697.596707] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 1697.598237] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1697.599750] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1697.601298] CPU: 0 PID: 10659 Comm: syz-executor.7 Not tainted 5.10.230 #1 [ 1697.602863] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1697.604695] Call Trace: [ 1697.605254] dump_stack+0x107/0x167 [ 1697.606014] should_fail.cold+0x5/0xa [ 1697.606823] ? security_file_alloc+0x34/0x170 [ 1697.607765] should_failslab+0x5/0x20 [ 1697.608560] kmem_cache_alloc+0x5b/0x310 [ 1697.609418] security_file_alloc+0x34/0x170 [ 1697.610319] __alloc_file+0xb7/0x320 [ 1697.611104] alloc_empty_file+0x6d/0x170 [ 1697.611956] path_openat+0xe6/0x2770 [ 1697.612742] ? __lock_acquire+0x1657/0x5b00 [ 1697.613019] FAULT_INJECTION: forcing a failure. [ 1697.613019] name failslab, interval 1, probability 0, space 0, times 0 [ 1697.613658] ? path_lookupat+0x860/0x860 [ 1697.613681] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1697.613707] ? lock_acquire+0x197/0x470 [ 1697.618766] ? find_held_lock+0x2c/0x110 [ 1697.619625] do_filp_open+0x190/0x3e0 [ 1697.620431] ? may_open_dev+0xf0/0xf0 [ 1697.621234] ? alloc_fd+0x2e7/0x670 [ 1697.622000] ? lock_downgrade+0x6d0/0x6d0 [ 1697.622883] ? do_raw_spin_lock+0x121/0x260 [ 1697.623788] ? rwlock_bug.part.0+0x90/0x90 [ 1697.624682] ? _raw_spin_unlock+0x1a/0x30 [ 1697.625551] ? alloc_fd+0x2e7/0x670 [ 1697.626324] do_sys_openat2+0x171/0x4d0 [ 1697.627173] ? build_open_flags+0x6f0/0x6f0 [ 1697.628086] ? rcu_read_lock_any_held+0x75/0xa0 [ 1697.629070] __x64_sys_openat+0x13f/0x1f0 [ 1697.629937] ? __ia32_sys_open+0x1c0/0x1c0 [ 1697.630839] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1697.631938] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1697.633023] do_syscall_64+0x33/0x40 [ 1697.633811] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1697.634894] RIP: 0033:0x7f3576635a04 [ 1697.635680] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1697.639573] RSP: 002b:00007f3573bf7ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1697.641173] RAX: ffffffffffffffda RBX: 00007f35766cc970 RCX: 00007f3576635a04 [ 1697.642686] RDX: 0000000000000002 RSI: 00007f3573bf8000 RDI: 00000000ffffff9c [ 1697.644176] RBP: 00007f3573bf8000 R08: 0000000000000000 R09: ffffffffffffffff [ 1697.645680] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1697.647189] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1697.648713] CPU: 1 PID: 10662 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1697.650241] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1697.651996] Call Trace: [ 1697.652570] dump_stack+0x107/0x167 [ 1697.653345] should_fail.cold+0x5/0xa [ 1697.654160] ? xas_alloc+0x336/0x440 [ 1697.654447] FAULT_INJECTION: forcing a failure. [ 1697.654447] name failslab, interval 1, probability 0, space 0, times 0 [ 1697.654972] should_failslab+0x5/0x20 [ 1697.658059] kmem_cache_alloc+0x5b/0x310 [ 1697.658928] xas_alloc+0x336/0x440 [ 1697.659680] xas_create+0x34a/0x10d0 [ 1697.660471] ? kernel_text_address+0xf2/0x120 [ 1697.661410] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1697.662508] xas_store+0x8c/0x1c40 [ 1697.663279] __xa_store+0x164/0x2d0 [ 1697.664045] ? xa_delete_node+0x280/0x280 [ 1697.664922] ? trace_hardirqs_on+0x5b/0x180 [ 1697.665830] xa_store+0x31/0x50 [ 1697.666531] __io_uring_add_tctx_node+0x1cf/0x520 [ 1697.667555] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1697.668663] ? alloc_fd+0x2e7/0x670 [ 1697.669437] io_uring_setup+0x1fbb/0x2980 [ 1697.670325] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1697.671391] ? wait_for_completion_io+0x270/0x270 [ 1697.672421] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1697.673521] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1697.674613] do_syscall_64+0x33/0x40 [ 1697.675400] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1697.676479] RIP: 0033:0x7fcc97c5ab19 [ 1697.677258] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1697.681151] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1697.682750] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1697.684291] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1697.685845] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1697.687339] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1697.688831] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1697.690469] CPU: 0 PID: 10665 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1697.691982] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1697.693841] Call Trace: [ 1697.694400] dump_stack+0x107/0x167 22:05:53 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 19) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:05:53 executing program 6: getpgid(0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x22902, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_io_uring_complete(0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x5d, 0x0, @thr={&(0x7f00000002c0)="c58435b56fadce6925a8c5ef8299d1c9436890996f121c55fd3949c7ffe74e562d5b7ad3ba81ec2ee03296fc177baf9eb677c3b886f2d2f6f15bbb7648f001000000a7e1de93ae4056fd27712f2d24552e5d7d39ec16e048786d22b4989871bad0f0ee169831b6e6f3e5f6aec27d337087b8119f6d755f6e40547c31e63fdaf4b4593725c72c370172c9527216a415009b28cfab12175e4c530e215b70f7b654b1cc73e9eabfb340bcf589b70ae5e8acd00b6770b80a2a135bf9bd68f3679d8a46b4c50a69d29136daef4804fe9cb5f8caceaeb2b7310d7154d547c522215a4a59b9787a63c4e818bd23c5668aa30f9e030613", &(0x7f0000000540)="2ac7a21c8555cb8161df3e647dcdb023da28a1a647a16e4f8e6fa8febca24d45c7a3d99bb9f57cbd2a9300e181ca7c1e21a348b0080a5409b2a4e4d827024c7bc481ad488ef6fded915ad2c221d17d526fba95e126bf2c8f45e164040e2fc26125b81d14d34a97df6efce3e5b87ef010bd0fd8fd"}}, &(0x7f0000000180)) r1 = socket$netlink(0x10, 0x3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000080)=""/200, 0x20000148}], 0x1, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000003c0)=""/101, 0x65) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000240), &(0x7f0000000440)={'L-', 0x3}, 0x16, 0x3) 22:05:53 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, 0xffffffffffffffff, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) 22:05:53 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 62) 22:05:53 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 26) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:05:53 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 29) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) [ 1697.695182] should_fail.cold+0x5/0xa [ 1697.696189] ? create_object.isra.0+0x3a/0xa20 [ 1697.697214] should_failslab+0x5/0x20 [ 1697.698031] kmem_cache_alloc+0x5b/0x310 [ 1697.698938] create_object.isra.0+0x3a/0xa20 [ 1697.699941] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1697.701015] kmem_cache_alloc+0x159/0x310 [ 1697.701882] ? trace_hardirqs_on+0x5b/0x180 [ 1697.702854] xas_alloc+0x336/0x440 [ 1697.703656] xas_create+0x60f/0x10d0 [ 1697.704455] xas_create_range+0x189/0x620 [ 1697.705399] shmem_add_to_page_cache+0x760/0x1130 [ 1697.706499] ? shmem_getattr+0x1a0/0x1a0 [ 1697.707387] shmem_getpage_gfp.constprop.0+0x64a/0x1920 [ 1697.708541] ? shmem_unuse_inode+0xf60/0xf60 [ 1697.709468] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1697.710599] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1697.711760] shmem_write_begin+0xf7/0x1d0 [ 1697.712636] generic_perform_write+0x20a/0x4f0 [ 1697.713611] ? page_cache_prev_miss+0x310/0x310 [ 1697.714608] ? evict_inodes+0x470/0x470 [ 1697.715448] ? generic_write_checks+0x2ad/0x390 [ 1697.716433] __generic_file_write_iter+0x39d/0x5d0 [ 1697.717470] generic_file_write_iter+0xdb/0x230 [ 1697.718446] ? iov_iter_init+0x3c/0x130 [ 1697.719296] new_sync_write+0x42c/0x660 [ 1697.720141] ? new_sync_read+0x6f0/0x6f0 [ 1697.720997] ? __x64_sys_pwrite64+0x201/0x260 [ 1697.721947] ? lock_release+0x680/0x680 [ 1697.722801] ? selinux_file_permission+0x92/0x520 [ 1697.723820] ? security_file_permission+0xb1/0xe0 [ 1697.724842] vfs_write+0x7c0/0xb10 [ 1697.725616] __x64_sys_pwrite64+0x201/0x260 [ 1697.726535] ? ksys_pwrite64+0x1b0/0x1b0 [ 1697.727407] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1697.728506] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1697.729594] do_syscall_64+0x33/0x40 [ 1697.730376] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1697.731456] RIP: 0033:0x7f3e51918ab7 [ 1697.732243] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1697.736113] RSP: 002b:00007f3e4eedaf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1697.737723] RAX: ffffffffffffffda RBX: 00007f3e519af970 RCX: 00007f3e51918ab7 [ 1697.739230] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000005 [ 1697.740733] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1697.742236] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000005 [ 1697.743761] R13: 0000000000000005 R14: 00000000200004a0 R15: 0000000000000004 22:05:53 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:05:53 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad59", 0xc5}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:05:53 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad59", 0xc5}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1697.832634] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:05:53 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, 0xffffffffffffffff, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) [ 1697.855777] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:05:53 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 63) 22:05:53 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 30) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:05:53 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 27) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1697.946335] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:05:53 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b6", 0xc8}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:05:53 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1697.978287] FAULT_INJECTION: forcing a failure. [ 1697.978287] name failslab, interval 1, probability 0, space 0, times 0 [ 1697.981026] CPU: 1 PID: 10691 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1697.982605] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1697.984354] Call Trace: [ 1697.984921] dump_stack+0x107/0x167 [ 1697.985693] should_fail.cold+0x5/0xa [ 1697.986500] ? create_object.isra.0+0x3a/0xa20 [ 1697.987481] should_failslab+0x5/0x20 [ 1697.988287] kmem_cache_alloc+0x5b/0x310 [ 1697.989148] ? mark_held_locks+0x9e/0xe0 [ 1697.990013] create_object.isra.0+0x3a/0xa20 [ 1697.990952] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1697.992034] kmem_cache_alloc+0x159/0x310 [ 1697.992923] xas_alloc+0x336/0x440 [ 1697.993682] xas_create+0x34a/0x10d0 [ 1697.994484] ? kernel_text_address+0xf2/0x120 [ 1697.995439] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1697.996545] xas_store+0x8c/0x1c40 [ 1697.997315] __xa_store+0x164/0x2d0 [ 1697.998096] ? xa_delete_node+0x280/0x280 [ 1697.999001] ? trace_hardirqs_on+0x5b/0x180 [ 1697.999923] xa_store+0x31/0x50 [ 1698.000632] __io_uring_add_tctx_node+0x1cf/0x520 [ 1698.001655] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1698.002770] ? alloc_fd+0x2e7/0x670 [ 1698.003555] io_uring_setup+0x1fbb/0x2980 [ 1698.004438] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1698.005506] ? wait_for_completion_io+0x270/0x270 [ 1698.006550] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1698.007670] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1698.008760] do_syscall_64+0x33/0x40 [ 1698.009545] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1698.010632] RIP: 0033:0x7fcc97c5ab19 [ 1698.011420] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1698.015280] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1698.016881] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1698.018379] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1698.019893] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1698.021402] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1698.022918] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 22:05:54 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 64) [ 1698.098858] FAULT_INJECTION: forcing a failure. [ 1698.098858] name failslab, interval 1, probability 0, space 0, times 0 [ 1698.101922] CPU: 1 PID: 10698 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1698.103395] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1698.105147] Call Trace: [ 1698.105714] dump_stack+0x107/0x167 [ 1698.106492] should_fail.cold+0x5/0xa [ 1698.107316] ? xas_alloc+0x336/0x440 [ 1698.108108] should_failslab+0x5/0x20 [ 1698.108916] kmem_cache_alloc+0x5b/0x310 [ 1698.109786] xas_alloc+0x336/0x440 [ 1698.110546] xas_create+0x34a/0x10d0 [ 1698.111360] ? kernel_text_address+0xf2/0x120 [ 1698.112317] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1698.113426] xas_store+0x8c/0x1c40 [ 1698.114199] __xa_store+0x164/0x2d0 [ 1698.114993] ? xa_delete_node+0x280/0x280 [ 1698.115883] ? trace_hardirqs_on+0x5b/0x180 [ 1698.116804] xa_store+0x31/0x50 [ 1698.117530] __io_uring_add_tctx_node+0x1cf/0x520 [ 1698.118761] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1698.119956] ? alloc_fd+0x2e7/0x670 [ 1698.120910] io_uring_setup+0x1fbb/0x2980 [ 1698.121801] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1698.123136] ? wait_for_completion_io+0x270/0x270 [ 1698.124195] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1698.125311] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1698.126396] do_syscall_64+0x33/0x40 [ 1698.127367] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1698.128458] RIP: 0033:0x7fcc97c5ab19 [ 1698.129254] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1698.133143] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1698.134838] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1698.136349] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1698.137862] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1698.139373] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1698.140882] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1698.155818] FAULT_INJECTION: forcing a failure. [ 1698.155818] name failslab, interval 1, probability 0, space 0, times 0 [ 1698.158383] CPU: 1 PID: 10696 Comm: syz-executor.4 Not tainted 5.10.230 #1 [ 1698.159869] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1698.161621] Call Trace: [ 1698.162190] dump_stack+0x107/0x167 [ 1698.162978] should_fail.cold+0x5/0xa [ 1698.163801] ? __kernfs_new_node+0xd4/0x860 [ 1698.164720] should_failslab+0x5/0x20 [ 1698.165534] kmem_cache_alloc+0x5b/0x310 [ 1698.166419] __kernfs_new_node+0xd4/0x860 [ 1698.167320] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1698.168329] ? lock_chain_count+0x20/0x20 [ 1698.169223] ? update_load_avg+0x162/0x1870 [ 1698.170147] ? find_held_lock+0x2c/0x110 [ 1698.171144] kernfs_new_node+0x18d/0x250 [ 1698.172191] kernfs_create_dir_ns+0x49/0x160 [ 1698.173138] internal_create_group+0x793/0xb30 [ 1698.174130] ? set_user_nice.part.0+0x2fd/0x760 [ 1698.175133] ? sysfs_remove_group+0x170/0x170 [ 1698.176085] ? lockdep_init_map_type+0x2c7/0x780 [ 1698.177092] ? blk_queue_flag_set+0x22/0x30 [ 1698.178004] ? __loop_update_dio+0x2d2/0x690 [ 1698.178949] loop_configure+0x958/0x1490 [ 1698.179817] lo_ioctl+0xa72/0x1760 [ 1698.180570] ? avc_has_extended_perms+0x7f1/0xf40 [ 1698.181595] ? loop_set_status_old+0x250/0x250 [ 1698.182559] ? avc_ss_reset+0x180/0x180 [ 1698.183410] ? find_held_lock+0x2c/0x110 [ 1698.184291] ? __lock_acquire+0xbb1/0x5b00 [ 1698.185226] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1698.186323] ? generic_block_fiemap+0x60/0x60 [ 1698.187276] ? lock_downgrade+0x6d0/0x6d0 [ 1698.188158] ? build_open_flags+0x6f0/0x6f0 [ 1698.189083] ? loop_set_status_old+0x250/0x250 [ 1698.190042] blkdev_ioctl+0x291/0x710 [ 1698.190868] ? blkdev_common_ioctl+0x1930/0x1930 [ 1698.191885] ? selinux_file_ioctl+0xb6/0x270 [ 1698.192826] block_ioctl+0xf9/0x140 [ 1698.193595] ? blkdev_read_iter+0x1c0/0x1c0 [ 1698.194524] __x64_sys_ioctl+0x19a/0x210 [ 1698.195402] do_syscall_64+0x33/0x40 [ 1698.196191] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1698.196359] FAULT_INJECTION: forcing a failure. [ 1698.196359] name failslab, interval 1, probability 0, space 0, times 0 [ 1698.197256] RIP: 0033:0x7f50ad7e08d7 [ 1698.197277] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1698.197287] RSP: 002b:00007f50aad55f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1698.197307] RAX: ffffffffffffffda RBX: 00007f50ad82a970 RCX: 00007f50ad7e08d7 [ 1698.197317] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1698.197327] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 1698.197337] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1698.197347] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1698.216022] CPU: 0 PID: 10704 Comm: syz-executor.7 Not tainted 5.10.230 #1 [ 1698.217429] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1698.219128] Call Trace: [ 1698.219672] dump_stack+0x107/0x167 [ 1698.220412] should_fail.cold+0x5/0xa [ 1698.221191] ? create_object.isra.0+0x3a/0xa20 [ 1698.222122] should_failslab+0x5/0x20 [ 1698.222911] kmem_cache_alloc+0x5b/0x310 [ 1698.223742] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1698.224863] create_object.isra.0+0x3a/0xa20 [ 1698.225760] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1698.226811] kmem_cache_alloc+0x159/0x310 [ 1698.227661] security_file_alloc+0x34/0x170 [ 1698.228536] __alloc_file+0xb7/0x320 [ 1698.229295] alloc_empty_file+0x6d/0x170 [ 1698.230119] path_openat+0xe6/0x2770 [ 1698.230886] ? __lock_acquire+0x1657/0x5b00 [ 1698.231769] ? path_lookupat+0x860/0x860 [ 1698.232596] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1698.233662] ? lock_acquire+0x197/0x470 [ 1698.234467] ? find_held_lock+0x2c/0x110 [ 1698.235310] do_filp_open+0x190/0x3e0 [ 1698.236080] ? may_open_dev+0xf0/0xf0 [ 1698.236858] ? alloc_fd+0x2e7/0x670 [ 1698.237600] ? lock_downgrade+0x6d0/0x6d0 [ 1698.238438] ? do_raw_spin_lock+0x121/0x260 [ 1698.239318] ? rwlock_bug.part.0+0x90/0x90 [ 1698.240183] ? _raw_spin_unlock+0x1a/0x30 [ 1698.241026] ? alloc_fd+0x2e7/0x670 [ 1698.241774] do_sys_openat2+0x171/0x4d0 [ 1698.242602] ? build_open_flags+0x6f0/0x6f0 [ 1698.243481] ? rcu_read_lock_any_held+0x75/0xa0 [ 1698.244417] __x64_sys_openat+0x13f/0x1f0 [ 1698.245253] ? __ia32_sys_open+0x1c0/0x1c0 [ 1698.246114] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1698.247177] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1698.248210] do_syscall_64+0x33/0x40 [ 1698.248956] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1698.249984] RIP: 0033:0x7f3576635a04 [ 1698.250752] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1698.254466] RSP: 002b:00007f3573bf7ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1698.256007] RAX: ffffffffffffffda RBX: 00007f35766cc970 RCX: 00007f3576635a04 [ 1698.257437] RDX: 0000000000000002 RSI: 00007f3573bf8000 RDI: 00000000ffffff9c [ 1698.258878] RBP: 00007f3573bf8000 R08: 0000000000000000 R09: ffffffffffffffff [ 1698.260319] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1698.261751] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1698.326359] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1698.398531] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1698.420303] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1710.331714] FAULT_INJECTION: forcing a failure. [ 1710.331714] name failslab, interval 1, probability 0, space 0, times 0 [ 1710.333251] CPU: 0 PID: 10727 Comm: syz-executor.7 Not tainted 5.10.230 #1 [ 1710.334072] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1710.335062] Call Trace: [ 1710.335389] dump_stack+0x107/0x167 [ 1710.335819] should_fail.cold+0x5/0xa [ 1710.336273] ? __kthread_create_on_node+0xd1/0x400 [ 1710.336861] should_failslab+0x5/0x20 [ 1710.337314] kmem_cache_alloc_trace+0x55/0x320 [ 1710.337869] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1710.338433] __kthread_create_on_node+0xd1/0x400 [ 1710.339011] ? __kthread_parkme+0x1d0/0x1d0 [ 1710.339533] ? __mutex_lock+0x4fe/0x10b0 [ 1710.340020] ? loop_configure+0xcb9/0x1490 [ 1710.340523] ? do_raw_spin_unlock+0x4f/0x220 [ 1710.341045] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1710.341605] kthread_create_on_node+0xbb/0x100 [ 1710.342162] ? __kthread_create_on_node+0x400/0x400 [ 1710.342754] ? lockdep_init_map_type+0x2c7/0x780 [ 1710.343330] ? lockdep_init_map_type+0x2c7/0x780 [ 1710.344159] loop_configure+0x3e7/0x1490 [ 1710.344649] lo_ioctl+0xa72/0x1760 [ 1710.345072] ? avc_has_extended_perms+0x7f1/0xf40 [ 1710.345646] ? loop_set_status_old+0x250/0x250 [ 1710.346186] ? avc_ss_reset+0x180/0x180 [ 1710.346661] ? find_held_lock+0x2c/0x110 [ 1710.347167] ? __lock_acquire+0xbb1/0x5b00 [ 1710.347688] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1710.348304] ? generic_block_fiemap+0x60/0x60 [ 1710.348832] ? lock_downgrade+0x6d0/0x6d0 [ 1710.349318] ? build_open_flags+0x6f0/0x6f0 [ 1710.349828] ? loop_set_status_old+0x250/0x250 [ 1710.350369] blkdev_ioctl+0x291/0x710 [ 1710.350815] ? blkdev_common_ioctl+0x1930/0x1930 [ 1710.351384] ? selinux_file_ioctl+0xb6/0x270 [ 1710.351902] block_ioctl+0xf9/0x140 [ 1710.352335] ? blkdev_read_iter+0x1c0/0x1c0 [ 1710.352843] __x64_sys_ioctl+0x19a/0x210 [ 1710.353326] do_syscall_64+0x33/0x40 [ 1710.353764] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1710.354372] RIP: 0033:0x7f35766828d7 [ 1710.354811] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1710.356992] RSP: 002b:00007f3573bf7f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1710.357885] RAX: ffffffffffffffda RBX: 00007f35766cc970 RCX: 00007f35766828d7 [ 1710.358723] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1710.359575] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 1710.360413] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1710.361255] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 22:06:06 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 20) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:06:06 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) 22:06:06 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:06:06 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 28) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:06:06 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b6", 0xc8}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:06:06 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 65) 22:06:06 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 31) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:06:06 executing program 6: getpgid(0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x22902, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_io_uring_complete(0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x5d, 0x0, @thr={&(0x7f00000002c0)="c58435b56fadce6925a8c5ef8299d1c9436890996f121c55fd3949c7ffe74e562d5b7ad3ba81ec2ee03296fc177baf9eb677c3b886f2d2f6f15bbb7648f001000000a7e1de93ae4056fd27712f2d24552e5d7d39ec16e048786d22b4989871bad0f0ee169831b6e6f3e5f6aec27d337087b8119f6d755f6e40547c31e63fdaf4b4593725c72c370172c9527216a415009b28cfab12175e4c530e215b70f7b654b1cc73e9eabfb340bcf589b70ae5e8acd00b6770b80a2a135bf9bd68f3679d8a46b4c50a69d29136daef4804fe9cb5f8caceaeb2b7310d7154d547c522215a4a59b9787a63c4e818bd23c5668aa30f9e030613", &(0x7f0000000540)="2ac7a21c8555cb8161df3e647dcdb023da28a1a647a16e4f8e6fa8febca24d45c7a3d99bb9f57cbd2a9300e181ca7c1e21a348b0080a5409b2a4e4d827024c7bc481ad488ef6fded915ad2c221d17d526fba95e126bf2c8f45e164040e2fc26125b81d14d34a97df6efce3e5b87ef010bd0fd8fd"}}, &(0x7f0000000180)) r1 = socket$netlink(0x10, 0x3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000080)=""/200, 0x20000148}], 0x1, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000003c0)=""/101, 0x65) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000240), &(0x7f0000000440)={'L-', 0x3}, 0x16, 0x3) [ 1710.368491] FAULT_INJECTION: forcing a failure. [ 1710.368491] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1710.369954] CPU: 0 PID: 10737 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1710.370789] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1710.371784] Call Trace: [ 1710.372101] dump_stack+0x107/0x167 [ 1710.372530] should_fail.cold+0x5/0xa [ 1710.372979] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 1710.373617] ? shmem_write_begin+0xf7/0x1d0 [ 1710.374132] ? shmem_write_begin+0x100/0x1d0 [ 1710.374565] FAULT_INJECTION: forcing a failure. [ 1710.374565] name failslab, interval 1, probability 0, space 0, times 0 [ 1710.374663] generic_perform_write+0x279/0x4f0 [ 1710.377511] ? page_cache_prev_miss+0x310/0x310 [ 1710.378059] ? evict_inodes+0x470/0x470 [ 1710.378536] ? generic_write_checks+0x2ad/0x390 [ 1710.379094] __generic_file_write_iter+0x39d/0x5d0 [ 1710.379669] generic_file_write_iter+0xdb/0x230 [ 1710.380214] ? iov_iter_init+0x3c/0x130 [ 1710.380679] new_sync_write+0x42c/0x660 [ 1710.381146] ? new_sync_read+0x6f0/0x6f0 [ 1710.381622] ? __x64_sys_pwrite64+0x201/0x260 [ 1710.382153] ? lock_release+0x680/0x680 [ 1710.382615] ? selinux_file_permission+0x92/0x520 [ 1710.383193] ? security_file_permission+0xb1/0xe0 [ 1710.383762] vfs_write+0x7c0/0xb10 [ 1710.384185] __x64_sys_pwrite64+0x201/0x260 [ 1710.384688] ? ksys_pwrite64+0x1b0/0x1b0 [ 1710.385170] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1710.385777] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1710.386385] do_syscall_64+0x33/0x40 [ 1710.386816] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1710.387419] RIP: 0033:0x7f3e51918ab7 [ 1710.387852] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1710.389992] RSP: 002b:00007f3e4eedaf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1710.390884] RAX: ffffffffffffffda RBX: 00007f3e519af970 RCX: 00007f3e51918ab7 [ 1710.391719] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000005 [ 1710.392545] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1710.393374] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000005 [ 1710.394203] R13: 0000000000000005 R14: 00000000200004a0 R15: 0000000000000004 [ 1710.395082] CPU: 1 PID: 10735 Comm: syz-executor.4 Not tainted 5.10.230 #1 [ 1710.396541] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1710.398253] Call Trace: [ 1710.398803] dump_stack+0x107/0x167 [ 1710.399562] should_fail.cold+0x5/0xa [ 1710.400345] ? create_object.isra.0+0x3a/0xa20 [ 1710.401291] should_failslab+0x5/0x20 [ 1710.402080] kmem_cache_alloc+0x5b/0x310 [ 1710.402915] create_object.isra.0+0x3a/0xa20 [ 1710.403816] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1710.404868] kmem_cache_alloc+0x159/0x310 [ 1710.405741] __kernfs_new_node+0xd4/0x860 [ 1710.406600] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1710.407581] ? lock_chain_count+0x20/0x20 [ 1710.408431] ? update_load_avg+0x162/0x1870 [ 1710.409315] ? find_held_lock+0x2c/0x110 [ 1710.410147] kernfs_new_node+0x18d/0x250 [ 1710.410979] kernfs_create_dir_ns+0x49/0x160 [ 1710.411899] internal_create_group+0x793/0xb30 [ 1710.412839] ? set_user_nice.part.0+0x2fd/0x760 [ 1710.413784] ? sysfs_remove_group+0x170/0x170 [ 1710.414706] ? lockdep_init_map_type+0x2c7/0x780 [ 1710.415697] ? blk_queue_flag_set+0x22/0x30 [ 1710.416586] ? __loop_update_dio+0x2d2/0x690 [ 1710.417485] loop_configure+0x958/0x1490 [ 1710.418333] lo_ioctl+0xa72/0x1760 [ 1710.419080] ? avc_has_extended_perms+0x7f1/0xf40 [ 1710.420062] ? loop_set_status_old+0x250/0x250 [ 1710.420990] ? avc_ss_reset+0x180/0x180 [ 1710.421796] ? find_held_lock+0x2c/0x110 [ 1710.422636] ? __lock_acquire+0xbb1/0x5b00 [ 1710.423556] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1710.424638] ? generic_block_fiemap+0x60/0x60 [ 1710.425549] ? lock_downgrade+0x6d0/0x6d0 [ 1710.426391] ? build_open_flags+0x6f0/0x6f0 [ 1710.427287] ? loop_set_status_old+0x250/0x250 [ 1710.428206] blkdev_ioctl+0x291/0x710 [ 1710.428986] ? blkdev_common_ioctl+0x1930/0x1930 [ 1710.429957] ? selinux_file_ioctl+0xb6/0x270 [ 1710.430871] block_ioctl+0xf9/0x140 [ 1710.431633] ? blkdev_read_iter+0x1c0/0x1c0 [ 1710.432521] __x64_sys_ioctl+0x19a/0x210 [ 1710.433363] do_syscall_64+0x33/0x40 [ 1710.434130] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1710.435185] RIP: 0033:0x7f50ad7e08d7 [ 1710.435952] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1710.439712] RSP: 002b:00007f50aad55f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1710.441268] RAX: ffffffffffffffda RBX: 00007f50ad82a970 RCX: 00007f50ad7e08d7 [ 1710.442722] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1710.444180] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 1710.445647] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1710.447124] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1710.458109] FAULT_INJECTION: forcing a failure. [ 1710.458109] name failslab, interval 1, probability 0, space 0, times 0 [ 1710.460554] CPU: 1 PID: 10741 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1710.461970] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1710.463674] Call Trace: [ 1710.464216] dump_stack+0x107/0x167 [ 1710.464963] should_fail.cold+0x5/0xa [ 1710.465743] ? ___slab_alloc+0x155/0x700 [ 1710.466574] ? create_object.isra.0+0x3a/0xa20 [ 1710.467520] should_failslab+0x5/0x20 [ 1710.468300] kmem_cache_alloc+0x5b/0x310 [ 1710.469135] create_object.isra.0+0x3a/0xa20 [ 1710.470044] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1710.471102] kmem_cache_alloc+0x159/0x310 [ 1710.471951] xas_alloc+0x336/0x440 [ 1710.472692] xas_create+0x34a/0x10d0 [ 1710.473467] ? kernel_text_address+0xf2/0x120 [ 1710.474389] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1710.475476] xas_store+0x8c/0x1c40 [ 1710.476222] __xa_store+0x164/0x2d0 [ 1710.476973] ? xa_delete_node+0x280/0x280 [ 1710.477828] ? trace_hardirqs_on+0x5b/0x180 [ 1710.478717] xa_store+0x31/0x50 [ 1710.479411] __io_uring_add_tctx_node+0x1cf/0x520 [ 1710.480393] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1710.481464] ? alloc_fd+0x2e7/0x670 [ 1710.482213] io_uring_setup+0x1fbb/0x2980 [ 1710.483153] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1710.484182] ? wait_for_completion_io+0x270/0x270 [ 1710.485179] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1710.486243] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1710.487303] do_syscall_64+0x33/0x40 [ 1710.488057] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1710.489091] RIP: 0033:0x7fcc97c5ab19 [ 1710.489845] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1710.493550] RSP: 002b:00007fcc951af108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1710.495092] RAX: ffffffffffffffda RBX: 00007fcc97d6e020 RCX: 00007fcc97c5ab19 [ 1710.496535] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1710.497979] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1710.499435] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1710.500879] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 22:06:06 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b6", 0xc8}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:06:06 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 29) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1710.584544] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1710.585420] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:06:06 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af", 0xca}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:06:06 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 66) 22:06:06 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 32) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:06:06 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) [ 1710.635798] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:06:06 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1710.659322] FAULT_INJECTION: forcing a failure. [ 1710.659322] name failslab, interval 1, probability 0, space 0, times 0 [ 1710.662120] CPU: 1 PID: 10762 Comm: syz-executor.7 Not tainted 5.10.230 #1 [ 1710.663565] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1710.665259] Call Trace: [ 1710.665815] dump_stack+0x107/0x167 [ 1710.665934] FAULT_INJECTION: forcing a failure. [ 1710.665934] name failslab, interval 1, probability 0, space 0, times 0 [ 1710.666565] should_fail.cold+0x5/0xa [ 1710.666590] ? create_object.isra.0+0x3a/0xa20 [ 1710.669600] should_failslab+0x5/0x20 [ 1710.670387] kmem_cache_alloc+0x5b/0x310 [ 1710.671237] create_object.isra.0+0x3a/0xa20 [ 1710.672144] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1710.673194] kmem_cache_alloc_trace+0x151/0x320 [ 1710.674156] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1710.675135] __kthread_create_on_node+0xd1/0x400 [ 1710.676107] ? __kthread_parkme+0x1d0/0x1d0 [ 1710.677007] ? __mutex_lock+0x4fe/0x10b0 [ 1710.677847] ? loop_configure+0xcb9/0x1490 [ 1710.678716] ? do_raw_spin_unlock+0x4f/0x220 [ 1710.679638] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1710.680728] kthread_create_on_node+0xbb/0x100 [ 1710.681792] ? __kthread_create_on_node+0x400/0x400 [ 1710.683253] ? lockdep_init_map_type+0x2c7/0x780 [ 1710.684384] ? lockdep_init_map_type+0x2c7/0x780 [ 1710.685511] loop_configure+0x3e7/0x1490 [ 1710.686461] ? lock_downgrade+0x6d0/0x6d0 [ 1710.687468] lo_ioctl+0xa72/0x1760 [ 1710.688324] ? avc_has_extended_perms+0x7f1/0xf40 [ 1710.689474] ? loop_set_status_old+0x250/0x250 [ 1710.690565] ? avc_ss_reset+0x180/0x180 [ 1710.691555] ? __lock_acquire+0xbb1/0x5b00 [ 1710.692610] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1710.694129] ? generic_block_fiemap+0x60/0x60 [ 1710.695300] ? lock_downgrade+0x6d0/0x6d0 [ 1710.696329] ? loop_set_status_old+0x250/0x250 [ 1710.697389] blkdev_ioctl+0x291/0x710 [ 1710.698289] ? blkdev_common_ioctl+0x1930/0x1930 [ 1710.699448] ? selinux_file_ioctl+0xb6/0x270 [ 1710.700505] block_ioctl+0xf9/0x140 [ 1710.701384] ? blkdev_read_iter+0x1c0/0x1c0 [ 1710.702378] __x64_sys_ioctl+0x19a/0x210 [ 1710.703355] do_syscall_64+0x33/0x40 [ 1710.704222] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1710.705658] RIP: 0033:0x7f35766828d7 [ 1710.706550] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1710.711824] RSP: 002b:00007f3573bf7f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1710.713764] RAX: ffffffffffffffda RBX: 00007f35766cc970 RCX: 00007f35766828d7 [ 1710.715434] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1710.717137] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 1710.718821] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1710.720545] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1710.722315] CPU: 0 PID: 10763 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1710.723176] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1710.724121] Call Trace: [ 1710.724428] dump_stack+0x107/0x167 [ 1710.724851] should_fail.cold+0x5/0xa [ 1710.725297] ? xas_alloc+0x336/0x440 [ 1710.725726] should_failslab+0x5/0x20 [ 1710.726164] kmem_cache_alloc+0x5b/0x310 [ 1710.726625] xas_alloc+0x336/0x440 [ 1710.727037] xas_create+0x34a/0x10d0 [ 1710.727473] ? kernel_text_address+0xf2/0x120 [ 1710.727989] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1710.728587] xas_store+0x8c/0x1c40 [ 1710.728998] __xa_store+0x164/0x2d0 [ 1710.729418] ? xa_delete_node+0x280/0x280 [ 1710.729890] ? trace_hardirqs_on+0x5b/0x180 [ 1710.730385] xa_store+0x31/0x50 [ 1710.730764] __io_uring_add_tctx_node+0x1cf/0x520 [ 1710.731326] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1710.731927] ? alloc_fd+0x2e7/0x670 [ 1710.732347] io_uring_setup+0x1fbb/0x2980 [ 1710.732820] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1710.733394] ? wait_for_completion_io+0x270/0x270 [ 1710.733964] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1710.734557] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1710.735157] do_syscall_64+0x33/0x40 [ 1710.735581] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1710.736161] RIP: 0033:0x7fcc97c5ab19 [ 1710.736585] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1710.738659] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1710.739527] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1710.740336] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1710.741146] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1710.741951] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1710.742760] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1710.841857] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1724.765530] FAULT_INJECTION: forcing a failure. [ 1724.765530] name failslab, interval 1, probability 0, space 0, times 0 [ 1724.768278] CPU: 1 PID: 10782 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1724.769841] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1724.771713] Call Trace: [ 1724.772311] dump_stack+0x107/0x167 [ 1724.773133] should_fail.cold+0x5/0xa [ 1724.773997] ? getname_flags.part.0+0x50/0x4f0 [ 1724.775031] should_failslab+0x5/0x20 [ 1724.775896] kmem_cache_alloc+0x5b/0x310 [ 1724.776809] ? new_sync_write+0x499/0x660 [ 1724.777744] getname_flags.part.0+0x50/0x4f0 [ 1724.778677] getname+0x8e/0xd0 [ 1724.779354] do_sys_openat2+0xf9/0x4d0 [ 1724.780161] ? build_open_flags+0x6f0/0x6f0 [ 1724.781079] ? rcu_read_lock_any_held+0x75/0xa0 [ 1724.782035] __x64_sys_openat+0x13f/0x1f0 [ 1724.782893] ? __ia32_sys_open+0x1c0/0x1c0 [ 1724.783788] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1724.784888] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1724.785960] do_syscall_64+0x33/0x40 [ 1724.786743] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1724.787819] RIP: 0033:0x7f3e51918a04 [ 1724.788591] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1724.792432] RSP: 002b:00007f3e4eedaed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1724.794020] RAX: ffffffffffffffda RBX: 00007f3e519af970 RCX: 00007f3e51918a04 [ 1724.795515] RDX: 0000000000000002 RSI: 00007f3e4eedb000 RDI: 00000000ffffff9c [ 1724.797008] RBP: 00007f3e4eedb000 R08: 0000000000000000 R09: ffffffffffffffff [ 1724.798505] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1724.800006] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1724.821582] FAULT_INJECTION: forcing a failure. [ 1724.821582] name failslab, interval 1, probability 0, space 0, times 0 [ 1724.824193] CPU: 0 PID: 10788 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1724.825653] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1724.827418] Call Trace: [ 1724.827979] dump_stack+0x107/0x167 [ 1724.828742] should_fail.cold+0x5/0xa [ 1724.829552] ? ___slab_alloc+0x155/0x700 [ 1724.830405] ? create_object.isra.0+0x3a/0xa20 [ 1724.831359] should_failslab+0x5/0x20 [ 1724.832171] kmem_cache_alloc+0x5b/0x310 [ 1724.833352] create_object.isra.0+0x3a/0xa20 [ 1724.834277] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1724.835355] kmem_cache_alloc+0x159/0x310 [ 1724.836243] xas_alloc+0x336/0x440 [ 1724.836993] xas_create+0x34a/0x10d0 [ 1724.837778] ? kernel_text_address+0xf2/0x120 [ 1724.838721] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1724.839824] xas_store+0x8c/0x1c40 [ 1724.840585] __xa_store+0x164/0x2d0 [ 1724.841349] ? xa_delete_node+0x280/0x280 [ 1724.842222] ? trace_hardirqs_on+0x5b/0x180 [ 1724.843144] xa_store+0x31/0x50 [ 1724.843842] __io_uring_add_tctx_node+0x1cf/0x520 [ 1724.844854] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1724.845956] ? alloc_fd+0x2e7/0x670 [ 1724.846736] io_uring_setup+0x1fbb/0x2980 [ 1724.847614] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1724.848685] ? wait_for_completion_io+0x270/0x270 [ 1724.849711] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1724.850810] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1724.851905] do_syscall_64+0x33/0x40 [ 1724.852689] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1724.853770] RIP: 0033:0x7fcc97c5ab19 [ 1724.854558] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1724.858428] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1724.860036] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1724.861538] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1724.863036] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1724.864552] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1724.866051] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 22:06:20 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 21) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:06:20 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) 22:06:20 executing program 6: getpgid(0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x22902, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_io_uring_complete(0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x5d, 0x0, @thr={&(0x7f00000002c0)="c58435b56fadce6925a8c5ef8299d1c9436890996f121c55fd3949c7ffe74e562d5b7ad3ba81ec2ee03296fc177baf9eb677c3b886f2d2f6f15bbb7648f001000000a7e1de93ae4056fd27712f2d24552e5d7d39ec16e048786d22b4989871bad0f0ee169831b6e6f3e5f6aec27d337087b8119f6d755f6e40547c31e63fdaf4b4593725c72c370172c9527216a415009b28cfab12175e4c530e215b70f7b654b1cc73e9eabfb340bcf589b70ae5e8acd00b6770b80a2a135bf9bd68f3679d8a46b4c50a69d29136daef4804fe9cb5f8caceaeb2b7310d7154d547c522215a4a59b9787a63c4e818bd23c5668aa30f9e030613", &(0x7f0000000540)="2ac7a21c8555cb8161df3e647dcdb023da28a1a647a16e4f8e6fa8febca24d45c7a3d99bb9f57cbd2a9300e181ca7c1e21a348b0080a5409b2a4e4d827024c7bc481ad488ef6fded915ad2c221d17d526fba95e126bf2c8f45e164040e2fc26125b81d14d34a97df6efce3e5b87ef010bd0fd8fd2cad78e0a46b9941"}}, &(0x7f0000000180)) r1 = socket$netlink(0x10, 0x3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000080)=""/200, 0x20000148}], 0x1, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000003c0)=""/101, 0x65) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000240), &(0x7f0000000440)={'L-', 0x3}, 0x16, 0x3) 22:06:20 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af", 0xca}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:06:20 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:06:20 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:06:20 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 67) 22:06:20 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 30) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1724.897409] FAULT_INJECTION: forcing a failure. [ 1724.897409] name failslab, interval 1, probability 0, space 0, times 0 [ 1724.900174] CPU: 0 PID: 10789 Comm: syz-executor.7 Not tainted 5.10.230 #1 [ 1724.901647] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1724.903399] Call Trace: [ 1724.903961] dump_stack+0x107/0x167 [ 1724.904459] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1724.904741] should_fail.cold+0x5/0xa [ 1724.908064] ? __kernfs_new_node+0xd4/0x860 [ 1724.908977] should_failslab+0x5/0x20 [ 1724.909775] kmem_cache_alloc+0x5b/0x310 [ 1724.910643] __kernfs_new_node+0xd4/0x860 [ 1724.911524] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1724.912531] ? lock_chain_count+0x20/0x20 [ 1724.913412] ? update_load_avg+0x162/0x1870 [ 1724.914318] ? find_held_lock+0x2c/0x110 [ 1724.915176] kernfs_new_node+0x18d/0x250 [ 1724.916052] kernfs_create_dir_ns+0x49/0x160 [ 1724.916982] internal_create_group+0x793/0xb30 [ 1724.917949] ? set_user_nice.part.0+0x2fd/0x760 [ 1724.918937] ? sysfs_remove_group+0x170/0x170 [ 1724.919893] ? lockdep_init_map_type+0x2c7/0x780 [ 1724.920897] ? blk_queue_flag_set+0x22/0x30 [ 1724.921809] ? __loop_update_dio+0x2d2/0x690 [ 1724.922743] loop_configure+0x958/0x1490 [ 1724.923628] lo_ioctl+0xa72/0x1760 [ 1724.924381] ? avc_has_extended_perms+0x7f1/0xf40 [ 1724.925413] ? loop_set_status_old+0x250/0x250 [ 1724.926376] ? avc_ss_reset+0x180/0x180 [ 1724.927227] ? find_held_lock+0x2c/0x110 [ 1724.928097] ? __lock_acquire+0xbb1/0x5b00 [ 1724.929039] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1724.930140] ? generic_block_fiemap+0x60/0x60 [ 1724.931096] ? lock_downgrade+0x6d0/0x6d0 22:06:20 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 22) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1724.931974] ? build_open_flags+0x6f0/0x6f0 [ 1724.933087] ? loop_set_status_old+0x250/0x250 [ 1724.934052] blkdev_ioctl+0x291/0x710 [ 1724.934855] ? blkdev_common_ioctl+0x1930/0x1930 [ 1724.935876] ? selinux_file_ioctl+0xb6/0x270 [ 1724.936803] block_ioctl+0xf9/0x140 [ 1724.937578] ? blkdev_read_iter+0x1c0/0x1c0 [ 1724.938494] __x64_sys_ioctl+0x19a/0x210 [ 1724.939351] do_syscall_64+0x33/0x40 [ 1724.940148] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1724.941240] RIP: 0033:0x7f35766828d7 [ 1724.942025] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1724.945938] RSP: 002b:00007f3573bf7f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1724.947550] RAX: ffffffffffffffda RBX: 00007f35766cc970 RCX: 00007f35766828d7 [ 1724.949055] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1724.950557] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 1724.952071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1724.953586] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1724.992837] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1725.006569] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:06:21 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) [ 1725.108876] FAULT_INJECTION: forcing a failure. [ 1725.108876] name failslab, interval 1, probability 0, space 0, times 0 [ 1725.111815] CPU: 1 PID: 10810 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1725.113361] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1725.115216] Call Trace: [ 1725.115833] dump_stack+0x107/0x167 [ 1725.116664] should_fail.cold+0x5/0xa [ 1725.117523] ? create_object.isra.0+0x3a/0xa20 [ 1725.118549] should_failslab+0x5/0x20 [ 1725.119406] kmem_cache_alloc+0x5b/0x310 [ 1725.120336] create_object.isra.0+0x3a/0xa20 [ 1725.121320] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1725.122448] kmem_cache_alloc+0x159/0x310 [ 1725.123380] ? new_sync_write+0x499/0x660 [ 1725.124323] getname_flags.part.0+0x50/0x4f0 [ 1725.125316] getname+0x8e/0xd0 [ 1725.126026] do_sys_openat2+0xf9/0x4d0 [ 1725.126900] ? build_open_flags+0x6f0/0x6f0 [ 1725.127901] ? rcu_read_lock_any_held+0x75/0xa0 [ 1725.128950] __x64_sys_openat+0x13f/0x1f0 [ 1725.129876] ? __ia32_sys_open+0x1c0/0x1c0 [ 1725.130834] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1725.132010] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1725.133172] do_syscall_64+0x33/0x40 [ 1725.134011] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1725.135162] RIP: 0033:0x7f3e51918a04 [ 1725.136017] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1725.140134] RSP: 002b:00007f3e4eedaed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1725.141808] RAX: ffffffffffffffda RBX: 00007f3e519af970 RCX: 00007f3e51918a04 [ 1725.143397] RDX: 0000000000000002 RSI: 00007f3e4eedb000 RDI: 00000000ffffff9c [ 1725.145035] RBP: 00007f3e4eedb000 R08: 0000000000000000 R09: ffffffffffffffff [ 1725.146613] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1725.148237] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 22:06:21 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:06:21 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 68) 22:06:21 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd5564b64", 0x5b}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af", 0xca}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:06:21 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:06:21 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 31) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1725.261910] FAULT_INJECTION: forcing a failure. [ 1725.261910] name failslab, interval 1, probability 0, space 0, times 0 [ 1725.264513] CPU: 1 PID: 10819 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1725.266057] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1725.267915] Call Trace: [ 1725.268510] dump_stack+0x107/0x167 [ 1725.269307] should_fail.cold+0x5/0xa [ 1725.270158] ? xas_alloc+0x336/0x440 [ 1725.270995] should_failslab+0x5/0x20 [ 1725.271884] kmem_cache_alloc+0x5b/0x310 [ 1725.272801] xas_alloc+0x336/0x440 [ 1725.273608] xas_create+0x34a/0x10d0 [ 1725.274441] ? kernel_text_address+0xf2/0x120 [ 1725.275442] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1725.276625] xas_store+0x8c/0x1c40 [ 1725.277416] __xa_store+0x164/0x2d0 [ 1725.278230] ? xa_delete_node+0x280/0x280 [ 1725.279144] ? trace_hardirqs_on+0x5b/0x180 [ 1725.280121] xa_store+0x31/0x50 [ 1725.280850] __io_uring_add_tctx_node+0x1cf/0x520 [ 1725.281904] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1725.283045] ? alloc_fd+0x2e7/0x670 [ 1725.283872] io_uring_setup+0x1fbb/0x2980 [ 1725.284790] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1725.285917] ? wait_for_completion_io+0x270/0x270 [ 1725.286994] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1725.288181] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1725.289339] do_syscall_64+0x33/0x40 [ 1725.290168] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1725.291331] RIP: 0033:0x7fcc97c5ab19 [ 1725.292187] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1725.296271] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1725.297983] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1725.299600] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1725.301187] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1725.302775] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1725.304378] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 22:06:21 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af83", 0xcb}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x5, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1725.340831] FAULT_INJECTION: forcing a failure. [ 1725.340831] name failslab, interval 1, probability 0, space 0, times 0 [ 1725.343543] CPU: 1 PID: 10824 Comm: syz-executor.7 Not tainted 5.10.230 #1 [ 1725.344984] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1725.346692] Call Trace: [ 1725.347237] dump_stack+0x107/0x167 [ 1725.348006] should_fail.cold+0x5/0xa [ 1725.348552] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1725.348798] ? create_object.isra.0+0x3a/0xa20 [ 1725.351826] should_failslab+0x5/0x20 [ 1725.352624] kmem_cache_alloc+0x5b/0x310 [ 1725.353468] create_object.isra.0+0x3a/0xa20 [ 1725.354373] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1725.355431] kmem_cache_alloc+0x159/0x310 [ 1725.356308] __kernfs_new_node+0xd4/0x860 [ 1725.357177] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1725.358168] ? lock_acquire+0x197/0x470 [ 1725.358992] ? lock_chain_count+0x20/0x20 [ 1725.359857] ? lock_acquire+0x197/0x470 [ 1725.360675] ? task_rq_lock+0xab/0x270 [ 1725.361490] ? lock_release+0x680/0x680 [ 1725.362306] ? find_held_lock+0x2c/0x110 [ 1725.363141] kernfs_new_node+0x18d/0x250 [ 1725.363992] kernfs_create_dir_ns+0x49/0x160 [ 1725.364901] internal_create_group+0x793/0xb30 [ 1725.365838] ? set_user_nice.part.0+0x2fd/0x760 [ 1725.366786] ? sysfs_remove_group+0x170/0x170 [ 1725.367721] ? lockdep_init_map_type+0x2c7/0x780 [ 1725.368700] ? blk_queue_flag_set+0x22/0x30 [ 1725.369583] ? __loop_update_dio+0x2d2/0x690 [ 1725.370491] loop_configure+0x958/0x1490 [ 1725.371335] lo_ioctl+0xa72/0x1760 [ 1725.372080] ? avc_has_extended_perms+0x7f1/0xf40 [ 1725.373070] ? loop_set_status_old+0x250/0x250 [ 1725.374012] ? avc_ss_reset+0x180/0x180 [ 1725.374825] ? find_held_lock+0x2c/0x110 [ 1725.375678] ? __lock_acquire+0xbb1/0x5b00 [ 1725.376586] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1725.377660] ? generic_block_fiemap+0x60/0x60 [ 1725.378570] ? lock_downgrade+0x6d0/0x6d0 [ 1725.379415] ? build_open_flags+0x6f0/0x6f0 [ 1725.380314] ? loop_set_status_old+0x250/0x250 [ 1725.381251] blkdev_ioctl+0x291/0x710 [ 1725.382035] ? blkdev_common_ioctl+0x1930/0x1930 [ 1725.383009] ? selinux_file_ioctl+0xb6/0x270 [ 1725.383932] block_ioctl+0xf9/0x140 [ 1725.384677] ? blkdev_read_iter+0x1c0/0x1c0 [ 1725.385565] __x64_sys_ioctl+0x19a/0x210 [ 1725.386401] do_syscall_64+0x33/0x40 [ 1725.387173] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1725.388239] RIP: 0033:0x7f35766828d7 [ 1725.389004] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1725.392853] RSP: 002b:00007f3573bf7f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1725.394431] RAX: ffffffffffffffda RBX: 00007f35766cc970 RCX: 00007f35766828d7 [ 1725.395925] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1725.397393] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 1725.398861] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1725.400337] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1725.422320] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1725.533745] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:06:34 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 32) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:06:34 executing program 6: getpgid(0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x22902, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_io_uring_complete(0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x5d, 0x0, @thr={&(0x7f00000002c0)="c58435b56fadce6925a8c5ef8299d1c9436890996f121c55fd3949c7ffe74e562d5b7ad3ba81ec2ee03296fc177baf9eb677c3b886f2d2f6f15bbb7648f001000000a7e1de93ae4056fd27712f2d24552e5d7d39ec16e048786d22b4989871bad0f0ee169831b6e6f3e5f6aec27d337087b8119f6d755f6e40547c31e63fdaf4b4593725c72c370172c9527216a415009b28cfab12175e4c530e215b70f7b654b1cc73e9eabfb340bcf589b70ae5e8acd00b6770b80a2a135bf9bd68f3679d8a46b4c50a69d29136daef4804fe9cb5f8caceaeb2b7310d7154d547c522215a4a59b9787a63c4e818bd23c5668aa30f9e030613", &(0x7f0000000540)="2ac7a21c8555cb8161df3e647dcdb023da28a1a647a16e4f8e6fa8febca24d45c7a3d99bb9f57cbd2a9300e181ca7c1e21a348b0080a5409b2a4e4d827024c7bc481ad488ef6fded915ad2c221d17d526fba95e126bf2c8f45e164040e2fc26125b81d14d34a97df6efce3e5b87ef010bd0fd8fd2cad78e0a46b9941"}}, &(0x7f0000000180)) r1 = socket$netlink(0x10, 0x3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000080)=""/200, 0x20000148}], 0x1, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000003c0)=""/101, 0x65) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000240), &(0x7f0000000440)={'L-', 0x3}, 0x16, 0x3) 22:06:34 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:06:34 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 23) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:06:34 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) 22:06:34 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 69) 22:06:34 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x18, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:06:34 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af83", 0xcb}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x5, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1738.971519] FAULT_INJECTION: forcing a failure. [ 1738.971519] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1738.974321] CPU: 0 PID: 10853 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1738.975777] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1738.977515] Call Trace: [ 1738.978071] dump_stack+0x107/0x167 [ 1738.978842] should_fail.cold+0x5/0xa [ 1738.979648] strncpy_from_user+0x34/0x470 [ 1738.980529] getname_flags.part.0+0x95/0x4f0 [ 1738.981449] getname+0x8e/0xd0 [ 1738.982116] do_sys_openat2+0xf9/0x4d0 [ 1738.982929] ? build_open_flags+0x6f0/0x6f0 [ 1738.983832] ? rcu_read_lock_any_held+0x75/0xa0 [ 1738.984814] __x64_sys_openat+0x13f/0x1f0 [ 1738.985683] ? __ia32_sys_open+0x1c0/0x1c0 [ 1738.986573] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1738.987669] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1738.988741] do_syscall_64+0x33/0x40 [ 1738.989519] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1738.990593] RIP: 0033:0x7f3e51918a04 [ 1738.991369] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1738.995225] RSP: 002b:00007f3e4eedaed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1738.996825] RAX: ffffffffffffffda RBX: 00007f3e519af970 RCX: 00007f3e51918a04 [ 1738.998314] RDX: 0000000000000002 RSI: 00007f3e4eedb000 RDI: 00000000ffffff9c [ 1738.999806] RBP: 00007f3e4eedb000 R08: 0000000000000000 R09: ffffffffffffffff [ 1739.001305] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1739.002803] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1739.007284] FAULT_INJECTION: forcing a failure. [ 1739.007284] name failslab, interval 1, probability 0, space 0, times 0 [ 1739.009957] CPU: 1 PID: 10855 Comm: syz-executor.7 Not tainted 5.10.230 #1 [ 1739.011412] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1739.013139] Call Trace: [ 1739.013698] dump_stack+0x107/0x167 [ 1739.014464] should_fail.cold+0x5/0xa [ 1739.015267] ? __kernfs_new_node+0xd4/0x860 [ 1739.016173] should_failslab+0x5/0x20 [ 1739.016968] kmem_cache_alloc+0x5b/0x310 [ 1739.017825] __kernfs_new_node+0xd4/0x860 [ 1739.018690] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1739.019670] ? kernfs_add_one+0x36e/0x4d0 [ 1739.020560] ? mutex_lock_io_nested+0xf30/0xf30 [ 1739.021535] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1739.022529] kernfs_new_node+0x18d/0x250 [ 1739.023370] __kernfs_create_file+0x51/0x350 [ 1739.024297] sysfs_add_file_mode_ns+0x221/0x560 [ 1739.025277] internal_create_group+0x324/0xb30 [ 1739.026243] ? sysfs_remove_group+0x170/0x170 [ 1739.027172] ? lockdep_init_map_type+0x2c7/0x780 [ 1739.028185] ? blk_queue_flag_set+0x22/0x30 [ 1739.029080] ? __loop_update_dio+0x2d2/0x690 [ 1739.030013] loop_configure+0x958/0x1490 [ 1739.030884] lo_ioctl+0xa72/0x1760 [ 1739.031629] ? avc_has_extended_perms+0x7f1/0xf40 [ 1739.032644] ? loop_set_status_old+0x250/0x250 [ 1739.033597] ? avc_ss_reset+0x180/0x180 [ 1739.034427] ? find_held_lock+0x2c/0x110 [ 1739.035277] ? __lock_acquire+0xbb1/0x5b00 [ 1739.036212] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1739.037308] ? generic_block_fiemap+0x60/0x60 [ 1739.038248] ? lock_downgrade+0x6d0/0x6d0 [ 1739.039106] ? build_open_flags+0x6f0/0x6f0 [ 1739.040030] ? loop_set_status_old+0x250/0x250 [ 1739.040982] blkdev_ioctl+0x291/0x710 [ 1739.041781] ? blkdev_common_ioctl+0x1930/0x1930 [ 1739.042792] ? selinux_file_ioctl+0xb6/0x270 [ 1739.043722] block_ioctl+0xf9/0x140 [ 1739.044492] ? blkdev_read_iter+0x1c0/0x1c0 [ 1739.045407] __x64_sys_ioctl+0x19a/0x210 [ 1739.046270] do_syscall_64+0x33/0x40 [ 1739.047049] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1739.048138] RIP: 0033:0x7f35766828d7 [ 1739.048923] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1739.052803] RSP: 002b:00007f3573bf7f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1739.054402] RAX: ffffffffffffffda RBX: 00007f35766cc970 RCX: 00007f35766828d7 [ 1739.055888] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1739.057395] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 1739.058904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1739.060412] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1739.099924] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1739.125864] FAULT_INJECTION: forcing a failure. [ 1739.125864] name failslab, interval 1, probability 0, space 0, times 0 [ 1739.128296] CPU: 1 PID: 10865 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1739.129762] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1739.131496] Call Trace: [ 1739.132068] dump_stack+0x107/0x167 [ 1739.132837] should_fail.cold+0x5/0xa [ 1739.133638] ? create_object.isra.0+0x3a/0xa20 [ 1739.134600] should_failslab+0x5/0x20 [ 1739.135394] kmem_cache_alloc+0x5b/0x310 [ 1739.136258] ? mark_held_locks+0x9e/0xe0 [ 1739.137135] create_object.isra.0+0x3a/0xa20 [ 1739.138055] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1739.139172] kmem_cache_alloc+0x159/0x310 [ 1739.140064] xas_alloc+0x336/0x440 [ 1739.140812] xas_create+0x34a/0x10d0 [ 1739.141598] ? kernel_text_address+0xf2/0x120 [ 1739.142542] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1739.143648] xas_store+0x8c/0x1c40 [ 1739.144413] __xa_store+0x164/0x2d0 [ 1739.145194] ? xa_delete_node+0x280/0x280 [ 1739.146073] ? trace_hardirqs_on+0x5b/0x180 [ 1739.146972] xa_store+0x31/0x50 [ 1739.147668] __io_uring_add_tctx_node+0x1cf/0x520 [ 1739.148696] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1739.149783] ? alloc_fd+0x2e7/0x670 [ 1739.150569] io_uring_setup+0x1fbb/0x2980 [ 1739.151450] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1739.152530] ? wait_for_completion_io+0x270/0x270 [ 1739.153563] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1739.154663] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1739.155741] do_syscall_64+0x33/0x40 [ 1739.156529] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1739.157605] RIP: 0033:0x7fcc97c5ab19 [ 1739.158388] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1739.162246] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1739.163850] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1739.165352] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1739.166847] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1739.168338] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1739.169836] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1739.222958] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1739.227308] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:06:35 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af83", 0xcb}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x5, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:06:35 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:06:35 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 24) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:06:35 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 70) 22:06:35 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) [ 1739.345810] FAULT_INJECTION: forcing a failure. [ 1739.345810] name failslab, interval 1, probability 0, space 0, times 0 [ 1739.348316] CPU: 1 PID: 10885 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1739.349761] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1739.351478] Call Trace: [ 1739.352034] dump_stack+0x107/0x167 [ 1739.352795] should_fail.cold+0x5/0xa [ 1739.353583] ? xas_alloc+0x336/0x440 [ 1739.354354] should_failslab+0x5/0x20 [ 1739.355141] kmem_cache_alloc+0x5b/0x310 [ 1739.356000] xas_alloc+0x336/0x440 [ 1739.356739] xas_create+0x34a/0x10d0 [ 1739.357526] ? kernel_text_address+0xf2/0x120 [ 1739.358456] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1739.359534] xas_store+0x8c/0x1c40 [ 1739.360332] __xa_store+0x164/0x2d0 [ 1739.361084] ? xa_delete_node+0x280/0x280 [ 1739.361942] ? trace_hardirqs_on+0x5b/0x180 [ 1739.362840] xa_store+0x31/0x50 [ 1739.363525] __io_uring_add_tctx_node+0x1cf/0x520 [ 1739.364536] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1739.365621] ? alloc_fd+0x2e7/0x670 [ 1739.366385] io_uring_setup+0x1fbb/0x2980 [ 1739.367255] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1739.368315] ? wait_for_completion_io+0x270/0x270 [ 1739.369335] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1739.370422] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1739.371496] do_syscall_64+0x33/0x40 [ 1739.372268] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1739.373339] RIP: 0033:0x7fcc97c5ab19 [ 1739.374114] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1739.378017] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1739.379638] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1739.381175] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1739.382706] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1739.384234] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1739.385758] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1739.396040] FAULT_INJECTION: forcing a failure. [ 1739.396040] name failslab, interval 1, probability 0, space 0, times 0 [ 1739.398841] CPU: 1 PID: 10886 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1739.400318] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1739.402074] Call Trace: [ 1739.402629] dump_stack+0x107/0x167 [ 1739.403395] should_fail.cold+0x5/0xa [ 1739.404208] ? __alloc_file+0x21/0x320 [ 1739.405023] ? __alloc_file+0x21/0x320 [ 1739.405847] should_failslab+0x5/0x20 [ 1739.406646] kmem_cache_alloc+0x5b/0x310 [ 1739.407507] __alloc_file+0x21/0x320 [ 1739.408336] alloc_empty_file+0x6d/0x170 [ 1739.409191] path_openat+0xe6/0x2770 [ 1739.409976] ? __lock_acquire+0x1657/0x5b00 [ 1739.410894] ? path_lookupat+0x860/0x860 [ 1739.411752] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1739.412861] ? lock_acquire+0x197/0x470 [ 1739.413697] ? find_held_lock+0x2c/0x110 [ 1739.414562] do_filp_open+0x190/0x3e0 [ 1739.415363] ? may_open_dev+0xf0/0xf0 [ 1739.416183] ? alloc_fd+0x2e7/0x670 [ 1739.416950] ? lock_downgrade+0x6d0/0x6d0 [ 1739.417821] ? do_raw_spin_lock+0x121/0x260 [ 1739.418730] ? rwlock_bug.part.0+0x90/0x90 [ 1739.419633] ? _raw_spin_unlock+0x1a/0x30 [ 1739.420510] ? alloc_fd+0x2e7/0x670 [ 1739.421286] do_sys_openat2+0x171/0x4d0 [ 1739.422135] ? build_open_flags+0x6f0/0x6f0 [ 1739.423056] ? rcu_read_lock_any_held+0x75/0xa0 [ 1739.424053] __x64_sys_openat+0x13f/0x1f0 [ 1739.424925] ? __ia32_sys_open+0x1c0/0x1c0 [ 1739.425834] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1739.426941] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1739.428040] do_syscall_64+0x33/0x40 [ 1739.428831] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1739.429919] RIP: 0033:0x7f3e51918a04 [ 1739.430704] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1739.434595] RSP: 002b:00007f3e4eedaed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1739.436209] RAX: ffffffffffffffda RBX: 00007f3e519af970 RCX: 00007f3e51918a04 [ 1739.437712] RDX: 0000000000000002 RSI: 00007f3e4eedb000 RDI: 00000000ffffff9c [ 1739.439211] RBP: 00007f3e4eedb000 R08: 0000000000000000 R09: ffffffffffffffff [ 1739.440722] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1739.442226] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 22:06:35 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x62, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:06:35 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 33) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:06:35 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) [ 1739.553421] FAULT_INJECTION: forcing a failure. [ 1739.553421] name failslab, interval 1, probability 0, space 0, times 0 [ 1739.556167] CPU: 1 PID: 10906 Comm: syz-executor.7 Not tainted 5.10.230 #1 [ 1739.557623] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1739.559364] Call Trace: [ 1739.559921] dump_stack+0x107/0x167 [ 1739.560702] should_fail.cold+0x5/0xa [ 1739.561501] ? create_object.isra.0+0x3a/0xa20 [ 1739.562459] should_failslab+0x5/0x20 [ 1739.563256] kmem_cache_alloc+0x5b/0x310 [ 1739.564133] create_object.isra.0+0x3a/0xa20 [ 1739.565051] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1739.566116] kmem_cache_alloc+0x159/0x310 [ 1739.566996] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1739.568184] idr_get_free+0x4b5/0x8f0 [ 1739.568996] idr_alloc_u32+0x170/0x2d0 [ 1739.569813] ? __fprop_inc_percpu_max+0x130/0x130 [ 1739.570824] ? lock_acquire+0x197/0x470 [ 1739.571667] ? __kernfs_new_node+0xff/0x860 [ 1739.572599] idr_alloc_cyclic+0x102/0x230 [ 1739.573466] ? idr_alloc+0x130/0x130 [ 1739.574240] ? rwlock_bug.part.0+0x90/0x90 [ 1739.575147] __kernfs_new_node+0x117/0x860 [ 1739.576062] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1739.577054] ? lock_acquire+0x197/0x470 [ 1739.577890] ? lock_chain_count+0x20/0x20 [ 1739.578761] ? lock_acquire+0x197/0x470 [ 1739.579602] ? task_rq_lock+0xab/0x270 [ 1739.580431] ? lock_release+0x680/0x680 [ 1739.581265] ? find_held_lock+0x2c/0x110 [ 1739.582118] kernfs_new_node+0x18d/0x250 [ 1739.582971] kernfs_create_dir_ns+0x49/0x160 [ 1739.583891] internal_create_group+0x793/0xb30 [ 1739.584859] ? set_user_nice.part.0+0x2fd/0x760 [ 1739.585830] ? sysfs_remove_group+0x170/0x170 [ 1739.586770] ? lockdep_init_map_type+0x2c7/0x780 [ 1739.587768] ? blk_queue_flag_set+0x22/0x30 [ 1739.588689] ? __loop_update_dio+0x2d2/0x690 [ 1739.589611] loop_configure+0x958/0x1490 [ 1739.590475] lo_ioctl+0xa72/0x1760 [ 1739.591231] ? avc_has_extended_perms+0x7f1/0xf40 [ 1739.592254] ? loop_set_status_old+0x250/0x250 [ 1739.593222] ? avc_ss_reset+0x180/0x180 [ 1739.594057] ? find_held_lock+0x2c/0x110 [ 1739.594921] ? __lock_acquire+0xbb1/0x5b00 [ 1739.595860] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1739.596961] ? generic_block_fiemap+0x60/0x60 [ 1739.597900] ? lock_downgrade+0x6d0/0x6d0 [ 1739.598766] ? build_open_flags+0x6f0/0x6f0 [ 1739.599676] ? loop_set_status_old+0x250/0x250 [ 1739.600644] blkdev_ioctl+0x291/0x710 [ 1739.601442] ? blkdev_common_ioctl+0x1930/0x1930 [ 1739.602442] ? selinux_file_ioctl+0xb6/0x270 [ 1739.603376] block_ioctl+0xf9/0x140 [ 1739.604157] ? blkdev_read_iter+0x1c0/0x1c0 [ 1739.605070] __x64_sys_ioctl+0x19a/0x210 [ 1739.605917] do_syscall_64+0x33/0x40 [ 1739.606697] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1739.607792] RIP: 0033:0x7f35766828d7 [ 1739.608579] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1739.612436] RSP: 002b:00007f3573bf7f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1739.614032] RAX: ffffffffffffffda RBX: 00007f35766cc970 RCX: 00007f35766828d7 [ 1739.615529] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1739.617034] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 1739.618535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1739.620040] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1739.708730] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:06:48 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 34) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:06:48 executing program 6: getpgid(0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x22902, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_io_uring_complete(0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x5d, 0x0, @thr={&(0x7f00000002c0)="c58435b56fadce6925a8c5ef8299d1c9436890996f121c55fd3949c7ffe74e562d5b7ad3ba81ec2ee03296fc177baf9eb677c3b886f2d2f6f15bbb7648f001000000a7e1de93ae4056fd27712f2d24552e5d7d39ec16e048786d22b4989871bad0f0ee169831b6e6f3e5f6aec27d337087b8119f6d755f6e40547c31e63fdaf4b4593725c72c370172c9527216a415009b28cfab12175e4c530e215b70f7b654b1cc73e9eabfb340bcf589b70ae5e8acd00b6770b80a2a135bf9bd68f3679d8a46b4c50a69d29136daef4804fe9cb5f8caceaeb2b7310d7154d547c522215a4a59b9787a63c4e818bd23c5668aa30f9e030613", &(0x7f0000000540)="2ac7a21c8555cb8161df3e647dcdb023da28a1a647a16e4f8e6fa8febca24d45c7a3d99bb9f57cbd2a9300e181ca7c1e21a348b0080a5409b2a4e4d827024c7bc481ad488ef6fded915ad2c221d17d526fba95e126bf2c8f45e164040e2fc26125b81d14d34a97df6efce3e5b87ef010bd0fd8fd2cad78e0a46b9941"}}, &(0x7f0000000180)) r1 = socket$netlink(0x10, 0x3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000080)=""/200, 0x20000148}], 0x1, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000003c0)=""/101, 0x65) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000240), &(0x7f0000000440)={'L-', 0x3}, 0x16, 0x3) 22:06:48 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {0x0}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af83", 0xcb}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:06:48 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 25) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:06:48 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 71) 22:06:48 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) 22:06:48 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:06:48 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) [ 1752.701257] FAULT_INJECTION: forcing a failure. [ 1752.701257] name failslab, interval 1, probability 0, space 0, times 0 [ 1752.703125] CPU: 1 PID: 10932 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1752.704096] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1752.705177] Call Trace: [ 1752.705536] dump_stack+0x107/0x167 [ 1752.706013] should_fail.cold+0x5/0xa [ 1752.706517] ? create_object.isra.0+0x3a/0xa20 [ 1752.707118] should_failslab+0x5/0x20 [ 1752.707608] kmem_cache_alloc+0x5b/0x310 [ 1752.708131] create_object.isra.0+0x3a/0xa20 [ 1752.708711] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1752.709381] kmem_cache_alloc+0x159/0x310 [ 1752.709923] __alloc_file+0x21/0x320 [ 1752.710399] alloc_empty_file+0x6d/0x170 [ 1752.710921] path_openat+0xe6/0x2770 [ 1752.711407] ? __lock_acquire+0x1657/0x5b00 [ 1752.711978] ? path_lookupat+0x860/0x860 [ 1752.712514] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1752.713203] ? lock_acquire+0x197/0x470 [ 1752.713714] ? find_held_lock+0x2c/0x110 [ 1752.714255] do_filp_open+0x190/0x3e0 [ 1752.714759] ? may_open_dev+0xf0/0xf0 [ 1752.715261] ? alloc_fd+0x2e7/0x670 [ 1752.715731] ? lock_downgrade+0x6d0/0x6d0 [ 1752.716276] ? do_raw_spin_lock+0x121/0x260 [ 1752.716848] ? rwlock_bug.part.0+0x90/0x90 [ 1752.717415] ? _raw_spin_unlock+0x1a/0x30 [ 1752.717957] ? alloc_fd+0x2e7/0x670 [ 1752.718432] do_sys_openat2+0x171/0x4d0 [ 1752.718951] ? build_open_flags+0x6f0/0x6f0 [ 1752.719519] ? rcu_read_lock_any_held+0x75/0xa0 [ 1752.720126] __x64_sys_openat+0x13f/0x1f0 [ 1752.720655] ? __ia32_sys_open+0x1c0/0x1c0 [ 1752.721200] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1752.721872] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1752.722532] do_syscall_64+0x33/0x40 [ 1752.723010] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1752.723664] RIP: 0033:0x7f3e51918a04 [ 1752.724141] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1752.726510] RSP: 002b:00007f3e4eedaed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1752.727497] RAX: ffffffffffffffda RBX: 00007f3e519af970 RCX: 00007f3e51918a04 [ 1752.728430] RDX: 0000000000000002 RSI: 00007f3e4eedb000 RDI: 00000000ffffff9c [ 1752.729348] RBP: 00007f3e4eedb000 R08: 0000000000000000 R09: ffffffffffffffff [ 1752.730277] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1752.731194] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1752.749914] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1752.758490] FAULT_INJECTION: forcing a failure. [ 1752.758490] name failslab, interval 1, probability 0, space 0, times 0 [ 1752.761646] CPU: 0 PID: 10934 Comm: syz-executor.7 Not tainted 5.10.230 #1 [ 1752.763383] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1752.765471] Call Trace: [ 1752.766140] dump_stack+0x107/0x167 [ 1752.767054] should_fail.cold+0x5/0xa [ 1752.768016] ? __kernfs_new_node+0xd4/0x860 [ 1752.769102] should_failslab+0x5/0x20 [ 1752.770049] kmem_cache_alloc+0x5b/0x310 [ 1752.771071] __kernfs_new_node+0xd4/0x860 [ 1752.772111] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1752.773293] ? kernfs_add_one+0x36e/0x4d0 [ 1752.774336] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1752.775549] ? wait_for_completion_io+0x270/0x270 [ 1752.776772] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 1752.778092] kernfs_new_node+0x18d/0x250 [ 1752.779116] __kernfs_create_file+0x51/0x350 [ 1752.780209] sysfs_add_file_mode_ns+0x221/0x560 [ 1752.781381] internal_create_group+0x324/0xb30 [ 1752.782517] ? sysfs_remove_group+0x170/0x170 [ 1752.783641] ? lockdep_init_map_type+0x2c7/0x780 [ 1752.784823] ? blk_queue_flag_set+0x22/0x30 [ 1752.785890] ? __loop_update_dio+0x2d2/0x690 [ 1752.786982] loop_configure+0x958/0x1490 [ 1752.787999] lo_ioctl+0xa72/0x1760 [ 1752.788892] ? avc_has_extended_perms+0x7f1/0xf40 [ 1752.790107] ? loop_set_status_old+0x250/0x250 [ 1752.791243] ? avc_ss_reset+0x180/0x180 [ 1752.792147] FAULT_INJECTION: forcing a failure. [ 1752.792147] name failslab, interval 1, probability 0, space 0, times 0 [ 1752.792223] ? find_held_lock+0x2c/0x110 [ 1752.794677] ? __lock_acquire+0xbb1/0x5b00 [ 1752.795771] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1752.797069] ? generic_block_fiemap+0x60/0x60 [ 1752.798175] ? lock_downgrade+0x6d0/0x6d0 [ 1752.799206] ? build_open_flags+0x6f0/0x6f0 [ 1752.800275] ? loop_set_status_old+0x250/0x250 [ 1752.801408] blkdev_ioctl+0x291/0x710 [ 1752.802349] ? blkdev_common_ioctl+0x1930/0x1930 [ 1752.803520] ? selinux_file_ioctl+0xb6/0x270 [ 1752.804623] block_ioctl+0xf9/0x140 [ 1752.805523] ? blkdev_read_iter+0x1c0/0x1c0 [ 1752.806589] __x64_sys_ioctl+0x19a/0x210 [ 1752.807593] do_syscall_64+0x33/0x40 [ 1752.808527] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1752.809801] RIP: 0033:0x7f35766828d7 [ 1752.810730] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1752.815311] RSP: 002b:00007f3573bf7f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1752.817205] RAX: ffffffffffffffda RBX: 00007f35766cc970 RCX: 00007f35766828d7 [ 1752.818701] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1752.820197] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 1752.821700] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1752.823193] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1752.824719] CPU: 1 PID: 10933 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1752.825604] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1752.826649] Call Trace: [ 1752.827015] dump_stack+0x107/0x167 [ 1752.827486] should_fail.cold+0x5/0xa [ 1752.827975] ? create_object.isra.0+0x3a/0xa20 [ 1752.828557] should_failslab+0x5/0x20 [ 1752.829041] kmem_cache_alloc+0x5b/0x310 [ 1752.829554] ? mark_held_locks+0x9e/0xe0 [ 1752.830069] create_object.isra.0+0x3a/0xa20 [ 1752.830619] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1752.831256] kmem_cache_alloc+0x159/0x310 [ 1752.831778] xas_alloc+0x336/0x440 [ 1752.832234] xas_create+0x34a/0x10d0 [ 1752.832723] ? kernel_text_address+0xf2/0x120 [ 1752.833291] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1752.833946] xas_store+0x8c/0x1c40 [ 1752.834410] __xa_store+0x164/0x2d0 [ 1752.834867] ? xa_delete_node+0x280/0x280 [ 1752.835391] ? trace_hardirqs_on+0x5b/0x180 [ 1752.835948] xa_store+0x31/0x50 [ 1752.836361] __io_uring_add_tctx_node+0x1cf/0x520 [ 1752.836975] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1752.837639] ? alloc_fd+0x2e7/0x670 [ 1752.838102] io_uring_setup+0x1fbb/0x2980 [ 1752.838648] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1752.839304] ? wait_for_completion_io+0x270/0x270 [ 1752.839958] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1752.840625] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1752.841273] do_syscall_64+0x33/0x40 [ 1752.841740] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1752.842386] RIP: 0033:0x7fcc97c5ab19 [ 1752.842862] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1752.845191] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1752.846144] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1752.847045] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1752.847931] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1752.848852] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1752.849736] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 22:06:48 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {0x0}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af83", 0xcb}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:06:48 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) 22:06:48 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 72) [ 1752.946762] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:06:48 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:06:48 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 35) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1752.989494] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1752.997698] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:06:48 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1753.015228] FAULT_INJECTION: forcing a failure. [ 1753.015228] name failslab, interval 1, probability 0, space 0, times 0 [ 1753.016640] CPU: 1 PID: 10958 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1753.017489] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1753.018512] Call Trace: [ 1753.018835] dump_stack+0x107/0x167 [ 1753.019271] should_fail.cold+0x5/0xa [ 1753.019728] ? create_object.isra.0+0x3a/0xa20 [ 1753.020272] should_failslab+0x5/0x20 [ 1753.020728] kmem_cache_alloc+0x5b/0x310 [ 1753.021215] ? mark_held_locks+0x9e/0xe0 [ 1753.021696] create_object.isra.0+0x3a/0xa20 [ 1753.022213] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1753.022812] kmem_cache_alloc+0x159/0x310 [ 1753.023306] xas_alloc+0x336/0x440 [ 1753.023729] xas_create+0x34a/0x10d0 [ 1753.024173] ? kernel_text_address+0xf2/0x120 [ 1753.024715] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1753.025329] xas_store+0x8c/0x1c40 [ 1753.025758] __xa_store+0x164/0x2d0 [ 1753.026198] ? xa_delete_node+0x280/0x280 [ 1753.026691] ? trace_hardirqs_on+0x5b/0x180 [ 1753.027203] xa_store+0x31/0x50 [ 1753.027599] __io_uring_add_tctx_node+0x1cf/0x520 [ 1753.028166] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1753.028786] ? alloc_fd+0x2e7/0x670 [ 1753.029218] io_uring_setup+0x1fbb/0x2980 [ 1753.029706] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1753.030303] ? wait_for_completion_io+0x270/0x270 [ 1753.030877] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1753.031486] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1753.032089] do_syscall_64+0x33/0x40 [ 1753.032532] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1753.033133] RIP: 0033:0x7fcc97c5ab19 [ 1753.033573] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1753.035727] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1753.036613] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1753.037446] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1753.038275] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1753.039105] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1753.039942] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 22:06:49 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 26) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:06:49 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {0x0}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af83", 0xcb}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1753.120335] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1753.156387] FAULT_INJECTION: forcing a failure. [ 1753.156387] name failslab, interval 1, probability 0, space 0, times 0 [ 1753.157770] CPU: 1 PID: 10974 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1753.158562] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1753.159500] Call Trace: [ 1753.159806] dump_stack+0x107/0x167 [ 1753.160221] should_fail.cold+0x5/0xa [ 1753.160662] ? security_file_alloc+0x34/0x170 [ 1753.161173] should_failslab+0x5/0x20 [ 1753.161604] kmem_cache_alloc+0x5b/0x310 [ 1753.162070] security_file_alloc+0x34/0x170 [ 1753.162560] __alloc_file+0xb7/0x320 [ 1753.162981] alloc_empty_file+0x6d/0x170 [ 1753.163443] path_openat+0xe6/0x2770 [ 1753.163874] ? __lock_acquire+0x1657/0x5b00 [ 1753.164367] ? path_lookupat+0x860/0x860 [ 1753.164839] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1753.165435] ? lock_acquire+0x197/0x470 [ 1753.165883] ? find_held_lock+0x2c/0x110 [ 1753.166349] do_filp_open+0x190/0x3e0 [ 1753.166779] ? may_open_dev+0xf0/0xf0 [ 1753.167215] ? alloc_fd+0x2e7/0x670 22:06:49 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x480, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1753.167631] ? lock_downgrade+0x6d0/0x6d0 [ 1753.168341] ? do_raw_spin_lock+0x121/0x260 [ 1753.168843] ? rwlock_bug.part.0+0x90/0x90 [ 1753.169328] ? _raw_spin_unlock+0x1a/0x30 [ 1753.169798] ? alloc_fd+0x2e7/0x670 [ 1753.170219] do_sys_openat2+0x171/0x4d0 [ 1753.170673] ? build_open_flags+0x6f0/0x6f0 [ 1753.171166] ? rcu_read_lock_any_held+0x75/0xa0 [ 1753.171694] __x64_sys_openat+0x13f/0x1f0 [ 1753.172165] ? __ia32_sys_open+0x1c0/0x1c0 [ 1753.172660] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1753.173254] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1753.173840] do_syscall_64+0x33/0x40 [ 1753.174264] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1753.174845] RIP: 0033:0x7f3e51918a04 [ 1753.175269] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1753.177369] RSP: 002b:00007f3e4eedaed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1753.178235] RAX: ffffffffffffffda RBX: 00007f3e519af970 RCX: 00007f3e51918a04 [ 1753.179045] RDX: 0000000000000002 RSI: 00007f3e4eedb000 RDI: 00000000ffffff9c [ 1753.179852] RBP: 00007f3e4eedb000 R08: 0000000000000000 R09: ffffffffffffffff [ 1753.180665] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1753.181470] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 22:07:03 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:07:03 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 27) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:07:03 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af83", 0xcb}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:07:03 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:07:03 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 73) 22:07:03 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:07:03 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) 22:07:03 executing program 6: getpgid(0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x22902, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_io_uring_complete(0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x5d, 0x0, @thr={&(0x7f00000002c0)="c58435b56fadce6925a8c5ef8299d1c9436890996f121c55fd3949c7ffe74e562d5b7ad3ba81ec2ee03296fc177baf9eb677c3b886f2d2f6f15bbb7648f001000000a7e1de93ae4056fd27712f2d24552e5d7d39ec16e048786d22b4989871bad0f0ee169831b6e6f3e5f6aec27d337087b8119f6d755f6e40547c31e63fdaf4b4593725c72c370172c9527216a415009b28cfab12175e4c530e215b70f7b654b1cc73e9eabfb340bcf589b70ae5e8acd00b6770b80a2a135bf9bd68f3679d8a46b4c50a69d29136daef4804fe9cb5f8caceaeb2b7310d7154d547c522215a4a59b9787a63c4e818bd23c5668aa30f9e030613", &(0x7f0000000540)="2ac7a21c8555cb8161df3e647dcdb023da28a1a647a16e4f8e6fa8febca24d45c7a3d99bb9f57cbd2a9300e181ca7c1e21a348b0080a5409b2a4e4d827024c7bc481ad488ef6fded915ad2c221d17d526fba95e126bf2c8f45e164040e2fc26125b81d14d34a97df6efce3e5b87ef010bd0fd8fd2cad78e0a46b99411deb3883"}}, &(0x7f0000000180)) r1 = socket$netlink(0x10, 0x3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000080)=""/200, 0x20000148}], 0x1, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000003c0)=""/101, 0x65) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000240), &(0x7f0000000440)={'L-', 0x3}, 0x16, 0x3) [ 1767.691560] FAULT_INJECTION: forcing a failure. [ 1767.691560] name failslab, interval 1, probability 0, space 0, times 0 [ 1767.693545] CPU: 0 PID: 10988 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1767.694730] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1767.696133] Call Trace: [ 1767.696580] dump_stack+0x107/0x167 [ 1767.697205] should_fail.cold+0x5/0xa [ 1767.697854] ? create_object.isra.0+0x3a/0xa20 [ 1767.698622] should_failslab+0x5/0x20 [ 1767.699269] kmem_cache_alloc+0x5b/0x310 [ 1767.699955] ? mark_held_locks+0x9e/0xe0 [ 1767.700641] create_object.isra.0+0x3a/0xa20 [ 1767.701382] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1767.702245] kmem_cache_alloc+0x159/0x310 [ 1767.702952] xas_alloc+0x336/0x440 [ 1767.703552] xas_create+0x34a/0x10d0 [ 1767.704180] ? kernel_text_address+0xf2/0x120 [ 1767.704943] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1767.705835] xas_store+0x8c/0x1c40 [ 1767.706448] __xa_store+0x164/0x2d0 [ 1767.707069] ? xa_delete_node+0x280/0x280 [ 1767.707784] ? trace_hardirqs_on+0x5b/0x180 [ 1767.708508] xa_store+0x31/0x50 [ 1767.709086] __io_uring_add_tctx_node+0x1cf/0x520 [ 1767.709906] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1767.710795] ? alloc_fd+0x2e7/0x670 [ 1767.711419] io_uring_setup+0x1fbb/0x2980 [ 1767.712131] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1767.712992] ? wait_for_completion_io+0x270/0x270 [ 1767.713827] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1767.714704] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1767.715579] do_syscall_64+0x33/0x40 [ 1767.716210] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1767.717081] RIP: 0033:0x7fcc97c5ab19 [ 1767.717730] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1767.720853] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1767.722148] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1767.723369] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1767.724371] FAULT_INJECTION: forcing a failure. [ 1767.724371] name failslab, interval 1, probability 0, space 0, times 0 [ 1767.724576] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1767.724595] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1767.729533] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1767.730783] CPU: 1 PID: 10997 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1767.732335] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1767.734201] Call Trace: [ 1767.734806] dump_stack+0x107/0x167 [ 1767.735620] should_fail.cold+0x5/0xa [ 1767.736482] ? create_object.isra.0+0x3a/0xa20 [ 1767.737517] should_failslab+0x5/0x20 [ 1767.738386] kmem_cache_alloc+0x5b/0x310 [ 1767.739304] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1767.740532] create_object.isra.0+0x3a/0xa20 [ 1767.741526] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1767.742680] kmem_cache_alloc+0x159/0x310 [ 1767.743626] security_file_alloc+0x34/0x170 [ 1767.744647] __alloc_file+0xb7/0x320 [ 1767.745644] alloc_empty_file+0x6d/0x170 [ 1767.746560] path_openat+0xe6/0x2770 [ 1767.747411] ? __lock_acquire+0x1657/0x5b00 [ 1767.748390] ? path_lookupat+0x860/0x860 [ 1767.749320] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1767.750508] ? lock_acquire+0x197/0x470 [ 1767.751403] ? find_held_lock+0x2c/0x110 [ 1767.752321] do_filp_open+0x190/0x3e0 [ 1767.753182] ? may_open_dev+0xf0/0xf0 [ 1767.754043] ? alloc_fd+0x2e7/0x670 [ 1767.754859] ? lock_downgrade+0x6d0/0x6d0 [ 1767.755788] ? do_raw_spin_lock+0x121/0x260 [ 1767.756753] ? rwlock_bug.part.0+0x90/0x90 [ 1767.757717] ? _raw_spin_unlock+0x1a/0x30 [ 1767.758661] ? alloc_fd+0x2e7/0x670 [ 1767.759509] do_sys_openat2+0x171/0x4d0 [ 1767.760404] ? build_open_flags+0x6f0/0x6f0 [ 1767.761388] ? rcu_read_lock_any_held+0x75/0xa0 [ 1767.762437] __x64_sys_openat+0x13f/0x1f0 [ 1767.763368] ? __ia32_sys_open+0x1c0/0x1c0 [ 1767.764318] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1767.765498] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1767.766657] do_syscall_64+0x33/0x40 [ 1767.767496] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1767.768643] RIP: 0033:0x7f3e51918a04 [ 1767.769479] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1767.773622] RSP: 002b:00007f3e4eedaed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1767.775326] RAX: ffffffffffffffda RBX: 00007f3e519af970 RCX: 00007f3e51918a04 [ 1767.776940] RDX: 0000000000000002 RSI: 00007f3e4eedb000 RDI: 00000000ffffff9c [ 1767.778549] RBP: 00007f3e4eedb000 R08: 0000000000000000 R09: ffffffffffffffff [ 1767.780149] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1767.781748] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1767.845747] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1767.880643] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1767.892954] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1767.920862] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:07:03 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af83", 0xcb}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:07:18 executing program 6: getpgid(0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x22902, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_io_uring_complete(0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x5d, 0x0, @thr={&(0x7f00000002c0)="c58435b56fadce6925a8c5ef8299d1c9436890996f121c55fd3949c7ffe74e562d5b7ad3ba81ec2ee03296fc177baf9eb677c3b886f2d2f6f15bbb7648f001000000a7e1de93ae4056fd27712f2d24552e5d7d39ec16e048786d22b4989871bad0f0ee169831b6e6f3e5f6aec27d337087b8119f6d755f6e40547c31e63fdaf4b4593725c72c370172c9527216a415009b28cfab12175e4c530e215b70f7b654b1cc73e9eabfb340bcf589b70ae5e8acd00b6770b80a2a135bf9bd68f3679d8a46b4c50a69d29136daef4804fe9cb5f8caceaeb2b7310d7154d547c522215a4a59b9787a63c4e818bd23c5668aa30f9e030613", &(0x7f0000000540)="2ac7a21c8555cb8161df3e647dcdb023da28a1a647a16e4f8e6fa8febca24d45c7a3d99bb9f57cbd2a9300e181ca7c1e21a348b0080a5409b2a4e4d827024c7bc481ad488ef6fded915ad2c221d17d526fba95e126bf2c8f45e164040e2fc26125b81d14d34a97df6efce3e5b87ef010bd0fd8fd2cad78e0a46b99411deb3883"}}, &(0x7f0000000180)) r1 = socket$netlink(0x10, 0x3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000080)=""/200, 0x20000148}], 0x1, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000003c0)=""/101, 0x65) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000240), &(0x7f0000000440)={'L-', 0x3}, 0x16, 0x3) 22:07:18 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af83", 0xcb}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:07:18 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:07:18 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:07:18 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) 22:07:18 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 28) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:07:18 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1782.950902] FAULT_INJECTION: forcing a failure. [ 1782.950902] name failslab, interval 1, probability 0, space 0, times 0 [ 1782.952536] CPU: 1 PID: 11029 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1782.953429] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1782.954495] Call Trace: [ 1782.954833] dump_stack+0x107/0x167 [ 1782.955293] should_fail.cold+0x5/0xa [ 1782.955799] ? __kthread_create_on_node+0xd1/0x400 [ 1782.956432] should_failslab+0x5/0x20 [ 1782.956917] kmem_cache_alloc_trace+0x55/0x320 [ 1782.957516] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1782.958117] __kthread_create_on_node+0xd1/0x400 [ 1782.958717] ? __kthread_parkme+0x1d0/0x1d0 [ 1782.959272] ? __mutex_lock+0x4fe/0x10b0 [ 1782.959783] ? loop_configure+0xcb9/0x1490 [ 1782.960317] ? do_raw_spin_unlock+0x4f/0x220 [ 1782.960873] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1782.961485] kthread_create_on_node+0xbb/0x100 [ 1782.962073] ? __kthread_create_on_node+0x400/0x400 [ 1782.962717] ? lockdep_init_map_type+0x2c7/0x780 [ 1782.963314] ? lockdep_init_map_type+0x2c7/0x780 [ 1782.963921] loop_configure+0x3e7/0x1490 [ 1782.964443] lo_ioctl+0xa72/0x1760 [ 1782.964899] ? avc_has_extended_perms+0x7f1/0xf40 [ 1782.965533] ? loop_set_status_old+0x250/0x250 [ 1782.966134] ? avc_ss_reset+0x180/0x180 [ 1782.966637] ? find_held_lock+0x2c/0x110 [ 1782.967156] ? __lock_acquire+0xbb1/0x5b00 [ 1782.967720] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1782.968374] ? generic_block_fiemap+0x60/0x60 [ 1782.968936] ? lock_downgrade+0x6d0/0x6d0 [ 1782.969470] ? build_open_flags+0x6f0/0x6f0 [ 1782.970013] ? loop_set_status_old+0x250/0x250 [ 1782.970585] blkdev_ioctl+0x291/0x710 [ 1782.971064] ? blkdev_common_ioctl+0x1930/0x1930 [ 1782.971665] ? selinux_file_ioctl+0xb6/0x270 [ 1782.972228] block_ioctl+0xf9/0x140 [ 1782.972689] ? blkdev_read_iter+0x1c0/0x1c0 [ 1782.973230] __x64_sys_ioctl+0x19a/0x210 [ 1782.973753] do_syscall_64+0x33/0x40 [ 1782.974224] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1782.974880] RIP: 0033:0x7f3e519658d7 [ 1782.975350] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1782.977689] RSP: 002b:00007f3e4eedaf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1782.978681] RAX: ffffffffffffffda RBX: 00007f3e519af970 RCX: 00007f3e519658d7 [ 1782.979585] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1782.980488] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 1782.981407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1782.982310] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 22:07:18 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 74) [ 1783.011046] FAULT_INJECTION: forcing a failure. [ 1783.011046] name failslab, interval 1, probability 0, space 0, times 0 [ 1783.013698] CPU: 0 PID: 11041 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1783.015254] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1783.017130] Call Trace: [ 1783.017741] dump_stack+0x107/0x167 [ 1783.018562] should_fail.cold+0x5/0xa [ 1783.019422] ? xas_alloc+0x336/0x440 [ 1783.020270] should_failslab+0x5/0x20 [ 1783.021131] kmem_cache_alloc+0x5b/0x310 [ 1783.022066] xas_alloc+0x336/0x440 [ 1783.022845] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1783.022874] xas_create+0x34a/0x10d0 [ 1783.024938] ? kernel_text_address+0xf2/0x120 [ 1783.025971] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1783.027164] xas_store+0x8c/0x1c40 [ 1783.027976] __xa_store+0x164/0x2d0 [ 1783.028793] ? xa_delete_node+0x280/0x280 [ 1783.029744] ? trace_hardirqs_on+0x5b/0x180 [ 1783.030730] xa_store+0x31/0x50 [ 1783.031472] __io_uring_add_tctx_node+0x1cf/0x520 [ 1783.032561] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1783.033765] ? alloc_fd+0x2e7/0x670 [ 1783.034595] io_uring_setup+0x1fbb/0x2980 [ 1783.035542] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1783.036694] ? wait_for_completion_io+0x270/0x270 [ 1783.037822] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1783.039043] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1783.040208] do_syscall_64+0x33/0x40 [ 1783.041046] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1783.042212] RIP: 0033:0x7fcc97c5ab19 [ 1783.043053] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1783.047212] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1783.048943] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1783.050557] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1783.052170] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1783.053781] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1783.055384] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 22:07:19 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 29) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:07:19 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:07:19 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) [ 1783.158916] FAULT_INJECTION: forcing a failure. [ 1783.158916] name failslab, interval 1, probability 0, space 0, times 0 [ 1783.161740] CPU: 0 PID: 11058 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1783.163299] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1783.165163] Call Trace: [ 1783.165775] dump_stack+0x107/0x167 [ 1783.166593] should_fail.cold+0x5/0xa [ 1783.167453] ? create_object.isra.0+0x3a/0xa20 [ 1783.168479] should_failslab+0x5/0x20 [ 1783.169343] kmem_cache_alloc+0x5b/0x310 [ 1783.170273] create_object.isra.0+0x3a/0xa20 [ 1783.171262] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1783.172403] kmem_cache_alloc_trace+0x151/0x320 [ 1783.173469] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1783.174537] __kthread_create_on_node+0xd1/0x400 [ 1783.175603] ? __kthread_parkme+0x1d0/0x1d0 [ 1783.176580] ? __mutex_lock+0x4fe/0x10b0 [ 1783.177504] ? loop_configure+0xcb9/0x1490 [ 1783.178450] ? do_raw_spin_unlock+0x4f/0x220 [ 1783.179443] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1783.180513] kthread_create_on_node+0xbb/0x100 [ 1783.181556] ? __kthread_create_on_node+0x400/0x400 [ 1783.182682] ? lockdep_init_map_type+0x2c7/0x780 [ 1783.183749] ? lockdep_init_map_type+0x2c7/0x780 [ 1783.184820] loop_configure+0x3e7/0x1490 [ 1783.185752] lo_ioctl+0xa72/0x1760 [ 1783.186554] ? avc_has_extended_perms+0x7f1/0xf40 [ 1783.187639] ? loop_set_status_old+0x250/0x250 [ 1783.188666] ? avc_ss_reset+0x180/0x180 [ 1783.189567] ? find_held_lock+0x2c/0x110 [ 1783.190536] ? __lock_acquire+0xbb1/0x5b00 [ 1783.191532] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1783.192708] ? generic_block_fiemap+0x60/0x60 [ 1783.193721] ? lock_downgrade+0x6d0/0x6d0 [ 1783.194649] ? build_open_flags+0x6f0/0x6f0 [ 1783.195624] ? loop_set_status_old+0x250/0x250 [ 1783.196647] blkdev_ioctl+0x291/0x710 [ 1783.197506] ? blkdev_common_ioctl+0x1930/0x1930 [ 1783.198570] ? selinux_file_ioctl+0xb6/0x270 [ 1783.199565] block_ioctl+0xf9/0x140 [ 1783.200381] ? blkdev_read_iter+0x1c0/0x1c0 [ 1783.201347] __x64_sys_ioctl+0x19a/0x210 [ 1783.202265] do_syscall_64+0x33/0x40 [ 1783.203099] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1783.204249] RIP: 0033:0x7f3e519658d7 [ 1783.205087] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1783.209219] RSP: 002b:00007f3e4eedaf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1783.210933] RAX: ffffffffffffffda RBX: 00007f3e519af970 RCX: 00007f3e519658d7 [ 1783.212539] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1783.214170] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 1783.215778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1783.217390] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1783.248442] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1783.268375] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1783.341679] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:07:19 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 75) [ 1783.361913] FAULT_INJECTION: forcing a failure. [ 1783.361913] name failslab, interval 1, probability 0, space 0, times 0 [ 1783.363245] CPU: 1 PID: 11071 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1783.364032] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1783.364980] Call Trace: [ 1783.365286] dump_stack+0x107/0x167 [ 1783.365714] should_fail.cold+0x5/0xa [ 1783.366153] ? create_object.isra.0+0x3a/0xa20 [ 1783.366675] should_failslab+0x5/0x20 [ 1783.367106] kmem_cache_alloc+0x5b/0x310 [ 1783.367567] ? mark_held_locks+0x9e/0xe0 [ 1783.368031] create_object.isra.0+0x3a/0xa20 [ 1783.368536] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1783.369117] kmem_cache_alloc+0x159/0x310 [ 1783.369600] xas_alloc+0x336/0x440 [ 1783.370008] xas_create+0x34a/0x10d0 [ 1783.370437] ? kernel_text_address+0xf2/0x120 [ 1783.370944] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1783.371541] xas_store+0x8c/0x1c40 [ 1783.371949] __xa_store+0x164/0x2d0 [ 1783.372365] ? xa_delete_node+0x280/0x280 [ 1783.372854] ? trace_hardirqs_on+0x5b/0x180 [ 1783.373347] xa_store+0x31/0x50 [ 1783.373730] __io_uring_add_tctx_node+0x1cf/0x520 [ 1783.374282] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1783.374875] ? alloc_fd+0x2e7/0x670 [ 1783.375295] io_uring_setup+0x1fbb/0x2980 [ 1783.375771] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1783.376351] ? wait_for_completion_io+0x270/0x270 [ 1783.376905] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1783.377508] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1783.378096] do_syscall_64+0x33/0x40 [ 1783.378522] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1783.379101] RIP: 0033:0x7fcc97c5ab19 [ 1783.379522] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1783.381630] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1783.382492] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1783.383302] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1783.384115] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1783.384984] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1783.385800] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1783.418545] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:07:32 executing program 6: getpgid(0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x22902, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_io_uring_complete(0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x5d, 0x0, @thr={&(0x7f00000002c0)="c58435b56fadce6925a8c5ef8299d1c9436890996f121c55fd3949c7ffe74e562d5b7ad3ba81ec2ee03296fc177baf9eb677c3b886f2d2f6f15bbb7648f001000000a7e1de93ae4056fd27712f2d24552e5d7d39ec16e048786d22b4989871bad0f0ee169831b6e6f3e5f6aec27d337087b8119f6d755f6e40547c31e63fdaf4b4593725c72c370172c9527216a415009b28cfab12175e4c530e215b70f7b654b1cc73e9eabfb340bcf589b70ae5e8acd00b6770b80a2a135bf9bd68f3679d8a46b4c50a69d29136daef4804fe9cb5f8caceaeb2b7310d7154d547c522215a4a59b9787a63c4e818bd23c5668aa30f9e030613", &(0x7f0000000540)="2ac7a21c8555cb8161df3e647dcdb023da28a1a647a16e4f8e6fa8febca24d45c7a3d99bb9f57cbd2a9300e181ca7c1e21a348b0080a5409b2a4e4d827024c7bc481ad488ef6fded915ad2c221d17d526fba95e126bf2c8f45e164040e2fc26125b81d14d34a97df6efce3e5b87ef010bd0fd8fd2cad78e0a46b99411deb3883"}}, &(0x7f0000000180)) r1 = socket$netlink(0x10, 0x3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000080)=""/200, 0x20000148}], 0x1, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000003c0)=""/101, 0x65) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000240), &(0x7f0000000440)={'L-', 0x3}, 0x16, 0x3) 22:07:32 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:07:32 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 76) 22:07:32 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 30) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:07:32 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6", 0x2e}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af83", 0xcb}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:07:32 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:07:32 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:07:32 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) [ 1796.202089] FAULT_INJECTION: forcing a failure. [ 1796.202089] name failslab, interval 1, probability 0, space 0, times 0 [ 1796.204988] CPU: 0 PID: 11087 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1796.206762] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1796.208873] Call Trace: [ 1796.209547] dump_stack+0x107/0x167 [ 1796.210486] should_fail.cold+0x5/0xa [ 1796.211457] ? xas_alloc+0x336/0x440 [ 1796.212408] should_failslab+0x5/0x20 [ 1796.213377] kmem_cache_alloc+0x5b/0x310 [ 1796.214425] xas_alloc+0x336/0x440 [ 1796.215337] xas_create+0x34a/0x10d0 [ 1796.216294] ? kernel_text_address+0xf2/0x120 [ 1796.217436] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1796.218763] xas_store+0x8c/0x1c40 [ 1796.219665] __xa_store+0x164/0x2d0 [ 1796.220581] ? xa_delete_node+0x280/0x280 [ 1796.221630] ? trace_hardirqs_on+0x5b/0x180 [ 1796.222727] xa_store+0x31/0x50 [ 1796.223558] __io_uring_add_tctx_node+0x1cf/0x520 [ 1796.224765] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1796.226265] ? alloc_fd+0x2e7/0x670 [ 1796.227039] io_uring_setup+0x1fbb/0x2980 [ 1796.227925] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1796.228989] ? wait_for_completion_io+0x270/0x270 [ 1796.230071] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1796.231201] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1796.232320] do_syscall_64+0x33/0x40 [ 1796.233126] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1796.234243] RIP: 0033:0x7fcc97c5ab19 [ 1796.235028] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1796.239003] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1796.240650] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1796.242186] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1796.243730] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1796.245256] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1796.246765] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 22:07:32 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6", 0x2e}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af83", 0xcb}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1796.280128] FAULT_INJECTION: forcing a failure. [ 1796.280128] name failslab, interval 1, probability 0, space 0, times 0 [ 1796.281535] CPU: 1 PID: 11099 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1796.282331] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1796.283273] Call Trace: [ 1796.283581] dump_stack+0x107/0x167 [ 1796.283981] should_fail.cold+0x5/0xa [ 1796.284410] ? __kernfs_new_node+0xd4/0x860 [ 1796.285019] should_failslab+0x5/0x20 [ 1796.285556] kmem_cache_alloc+0x5b/0x310 [ 1796.286147] __kernfs_new_node+0xd4/0x860 [ 1796.286748] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1796.287418] ? lock_chain_count+0x20/0x20 [ 1796.288021] ? update_load_avg+0x162/0x1870 [ 1796.288631] ? find_held_lock+0x2c/0x110 [ 1796.289212] kernfs_new_node+0x18d/0x250 [ 1796.289793] kernfs_create_dir_ns+0x49/0x160 [ 1796.290307] internal_create_group+0x793/0xb30 [ 1796.290961] ? set_user_nice.part.0+0x2fd/0x760 [ 1796.291572] ? sysfs_remove_group+0x170/0x170 [ 1796.292200] ? lockdep_init_map_type+0x2c7/0x780 [ 1796.292793] ? blk_queue_flag_set+0x22/0x30 [ 1796.293423] ? __loop_update_dio+0x2d2/0x690 [ 1796.294052] loop_configure+0x958/0x1490 [ 1796.294635] lo_ioctl+0xa72/0x1760 [ 1796.295155] ? avc_has_extended_perms+0x7f1/0xf40 [ 1796.295839] ? loop_set_status_old+0x250/0x250 [ 1796.296493] ? avc_ss_reset+0x180/0x180 [ 1796.296994] ? find_held_lock+0x2c/0x110 [ 1796.297578] ? __lock_acquire+0xbb1/0x5b00 [ 1796.298211] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1796.298955] ? generic_block_fiemap+0x60/0x60 [ 1796.299585] ? lock_downgrade+0x6d0/0x6d0 [ 1796.300170] ? build_open_flags+0x6f0/0x6f0 [ 1796.300726] ? loop_set_status_old+0x250/0x250 [ 1796.301370] blkdev_ioctl+0x291/0x710 [ 1796.301855] ? blkdev_common_ioctl+0x1930/0x1930 [ 1796.302530] ? selinux_file_ioctl+0xb6/0x270 [ 1796.303147] block_ioctl+0xf9/0x140 [ 1796.303616] ? blkdev_read_iter+0x1c0/0x1c0 [ 1796.304166] __x64_sys_ioctl+0x19a/0x210 [ 1796.304643] do_syscall_64+0x33/0x40 [ 1796.305164] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1796.305894] RIP: 0033:0x7f3e519658d7 [ 1796.306420] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1796.308946] RSP: 002b:00007f3e4eedaf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1796.310025] RAX: ffffffffffffffda RBX: 00007f3e519af970 RCX: 00007f3e519658d7 [ 1796.311039] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1796.312058] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 1796.313065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1796.314040] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 22:07:32 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 77) [ 1796.392395] FAULT_INJECTION: forcing a failure. [ 1796.392395] name failslab, interval 1, probability 0, space 0, times 0 [ 1796.394096] CPU: 1 PID: 11116 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1796.395071] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1796.396243] Call Trace: [ 1796.396634] dump_stack+0x107/0x167 [ 1796.397144] should_fail.cold+0x5/0xa [ 1796.397683] ? create_object.isra.0+0x3a/0xa20 [ 1796.398235] should_failslab+0x5/0x20 [ 1796.398649] kmem_cache_alloc+0x5b/0x310 [ 1796.399124] ? mark_held_locks+0x9e/0xe0 [ 1796.399592] create_object.isra.0+0x3a/0xa20 [ 1796.400063] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1796.400658] kmem_cache_alloc+0x159/0x310 [ 1796.401133] xas_alloc+0x336/0x440 [ 1796.401537] xas_create+0x34a/0x10d0 [ 1796.401983] ? kernel_text_address+0xf2/0x120 [ 1796.402502] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1796.403103] xas_store+0x8c/0x1c40 [ 1796.403520] __xa_store+0x164/0x2d0 [ 1796.403946] ? xa_delete_node+0x280/0x280 [ 1796.404417] ? trace_hardirqs_on+0x5b/0x180 [ 1796.404930] xa_store+0x31/0x50 [ 1796.405315] __io_uring_add_tctx_node+0x1cf/0x520 [ 1796.405909] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 1796.406637] ? alloc_fd+0x2e7/0x670 [ 1796.407144] io_uring_setup+0x1fbb/0x2980 [ 1796.407728] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 1796.408431] ? wait_for_completion_io+0x270/0x270 [ 1796.409017] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1796.409614] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1796.410219] do_syscall_64+0x33/0x40 [ 1796.410670] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1796.411383] RIP: 0033:0x7fcc97c5ab19 [ 1796.411905] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1796.414475] RSP: 002b:00007fcc951d0108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1796.415646] RAX: ffffffffffffffda RBX: 00007fcc97d6df60 RCX: 00007fcc97c5ab19 [ 1796.416642] RDX: 0000000020ff9000 RSI: 0000000020000140 RDI: 0000000000003164 [ 1796.417443] RBP: 0000000020000140 R08: 00000000200001c0 R09: 00000000200001c0 [ 1796.418449] R10: 0000000020000040 R11: 0000000000000202 R12: 00000000200001c0 [ 1796.419446] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1796.436409] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1796.438203] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1796.447815] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1796.462858] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:07:32 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) 22:07:32 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6", 0x2e}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af83", 0xcb}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:07:32 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:07:32 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:07:32 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 31) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:07:32 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb00, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1796.584252] FAULT_INJECTION: forcing a failure. [ 1796.584252] name failslab, interval 1, probability 0, space 0, times 0 [ 1796.586887] CPU: 0 PID: 11135 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1796.588353] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1796.590106] Call Trace: [ 1796.590664] dump_stack+0x107/0x167 [ 1796.591429] should_fail.cold+0x5/0xa [ 1796.592221] ? create_object.isra.0+0x3a/0xa20 [ 1796.593205] should_failslab+0x5/0x20 [ 1796.594019] kmem_cache_alloc+0x5b/0x310 [ 1796.594883] create_object.isra.0+0x3a/0xa20 [ 1796.595785] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1796.596827] kmem_cache_alloc+0x159/0x310 [ 1796.597693] __kernfs_new_node+0xd4/0x860 [ 1796.598555] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1796.599523] ? lock_chain_count+0x20/0x20 [ 1796.600375] ? update_load_avg+0x162/0x1870 [ 1796.601264] ? find_held_lock+0x2c/0x110 [ 1796.602102] kernfs_new_node+0x18d/0x250 [ 1796.602938] kernfs_create_dir_ns+0x49/0x160 [ 1796.603873] internal_create_group+0x793/0xb30 [ 1796.604854] ? set_user_nice.part.0+0x2fd/0x760 [ 1796.605803] ? sysfs_remove_group+0x170/0x170 [ 1796.606770] ? lockdep_init_map_type+0x2c7/0x780 [ 1796.607804] ? blk_queue_flag_set+0x22/0x30 [ 1796.608741] ? __loop_update_dio+0x2d2/0x690 [ 1796.609698] loop_configure+0x958/0x1490 [ 1796.610601] lo_ioctl+0xa72/0x1760 [ 1796.611375] ? avc_has_extended_perms+0x7f1/0xf40 [ 1796.612373] ? loop_set_status_old+0x250/0x250 [ 1796.613330] ? avc_ss_reset+0x180/0x180 [ 1796.614163] ? find_held_lock+0x2c/0x110 [ 1796.615039] ? __lock_acquire+0xbb1/0x5b00 [ 1796.615957] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1796.617031] ? generic_block_fiemap+0x60/0x60 [ 1796.617978] ? lock_downgrade+0x6d0/0x6d0 [ 1796.618879] ? build_open_flags+0x6f0/0x6f0 [ 1796.619817] ? loop_set_status_old+0x250/0x250 [ 1796.620810] blkdev_ioctl+0x291/0x710 [ 1796.621634] ? blkdev_common_ioctl+0x1930/0x1930 [ 1796.622671] ? selinux_file_ioctl+0xb6/0x270 [ 1796.623631] block_ioctl+0xf9/0x140 [ 1796.624417] ? blkdev_read_iter+0x1c0/0x1c0 [ 1796.625354] __x64_sys_ioctl+0x19a/0x210 [ 1796.626247] do_syscall_64+0x33/0x40 [ 1796.627056] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1796.628141] RIP: 0033:0x7f3e519658d7 [ 1796.628946] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1796.632815] RSP: 002b:00007f3e4eedaf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1796.634469] RAX: ffffffffffffffda RBX: 00007f3e519af970 RCX: 00007f3e519658d7 [ 1796.636020] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1796.637546] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 1796.639029] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1796.640527] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 1796.686456] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1796.715454] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:07:45 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1008, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:07:45 executing program 6: getpgid(0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x22902, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_io_uring_complete(0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x5d, 0x0, @thr={&(0x7f00000002c0)="c58435b56fadce6925a8c5ef8299d1c9436890996f121c55fd3949c7ffe74e562d5b7ad3ba81ec2ee03296fc177baf9eb677c3b886f2d2f6f15bbb7648f001000000a7e1de93ae4056fd27712f2d24552e5d7d39ec16e048786d22b4989871bad0f0ee169831b6e6f3e5f6aec27d337087b8119f6d755f6e40547c31e63fdaf4b4593725c72c370172c9527216a415009b28cfab12175e4c530e215b70f7b654b1cc73e9eabfb340bcf589b70ae5e8acd00b6770b80a2a135bf9bd68f3679d8a46b4c50a69d29136daef4804fe9cb5f8caceaeb2b7310d7154d547c522215a4a59b9787a63c4e818bd23c5668aa30f9e030613", &(0x7f0000000540)="2ac7a21c8555cb8161df3e647dcdb023da28a1a647a16e4f8e6fa8febca24d45c7a3d99bb9f57cbd2a9300e181ca7c1e21a348b0080a5409b2a4e4d827024c7bc481ad488ef6fded915ad2c221d17d526fba95e126bf2c8f45e164040e2fc26125b81d14d34a97df6efce3e5b87ef010bd0fd8fd2cad78e0a46b99411deb38836c2a"}}, &(0x7f0000000180)) r1 = socket$netlink(0x10, 0x3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000080)=""/200, 0x20000148}], 0x1, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000003c0)=""/101, 0x65) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000240), &(0x7f0000000440)={'L-', 0x3}, 0x16, 0x3) 22:07:45 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 78) 22:07:45 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:07:45 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:07:45 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3", 0x45}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af83", 0xcb}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:07:45 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 32) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:07:45 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) [ 1809.871722] FAULT_INJECTION: forcing a failure. [ 1809.871722] name failslab, interval 1, probability 0, space 0, times 0 [ 1809.874512] CPU: 1 PID: 11155 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1809.875968] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1809.877720] Call Trace: [ 1809.878295] dump_stack+0x107/0x167 [ 1809.879068] should_fail.cold+0x5/0xa [ 1809.879866] ? vm_area_dup+0x78/0x290 [ 1809.880673] should_failslab+0x5/0x20 [ 1809.881477] kmem_cache_alloc+0x5b/0x310 [ 1809.882358] vm_area_dup+0x78/0x290 [ 1809.883131] ? lock_release+0x680/0x680 [ 1809.883977] ? mark_lock+0xf5/0x2df0 [ 1809.884700] FAULT_INJECTION: forcing a failure. [ 1809.884700] name failslab, interval 1, probability 0, space 0, times 0 [ 1809.887063] ? lock_chain_count+0x20/0x20 [ 1809.887134] ? mark_lock+0xf5/0x2df0 [ 1809.887158] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1809.887177] ? lock_chain_count+0x20/0x20 [ 1809.887201] ? mark_lock+0xf5/0x2df0 [ 1809.887219] ? vm_area_alloc+0x110/0x110 [ 1809.887243] ? __lock_acquire+0x1657/0x5b00 [ 1809.887280] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1809.894217] ? vmacache_find+0x55/0x2a0 [ 1809.895053] __split_vma+0xa8/0x570 [ 1809.895815] __do_munmap+0x365/0x1260 [ 1809.896614] ? lock_release+0x680/0x680 [ 1809.897450] mmap_region+0x776/0x1590 [ 1809.898253] ? get_unmapped_area+0x2f0/0x420 [ 1809.899177] do_mmap+0xcdb/0x11e0 [ 1809.899911] vm_mmap_pgoff+0x198/0x1f0 [ 1809.900725] ? randomize_page+0xb0/0xb0 [ 1809.901568] ksys_mmap_pgoff+0x41c/0x560 [ 1809.902426] ? find_mergeable_anon_vma+0x250/0x250 [ 1809.903457] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1809.904550] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1809.905625] do_syscall_64+0x33/0x40 [ 1809.906417] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1809.907486] RIP: 0033:0x7fcc97c5ab62 [ 1809.908262] Code: 00 00 00 00 00 0f 1f 00 41 f7 c1 ff 0f 00 00 75 27 55 48 89 fd 53 89 cb 48 85 ff 74 3b 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 66 5b 5d c3 0f 1f 00 48 c7 c0 bc ff ff ff 64 [ 1809.912124] RSP: 002b:00007fcc951d00f8 EFLAGS: 00000206 ORIG_RAX: 0000000000000009 [ 1809.913718] RAX: ffffffffffffffda RBX: 0000000000008011 RCX: 00007fcc97c5ab62 [ 1809.915213] RDX: 0000000000000003 RSI: 0000000000090140 RDI: 0000000020ff9000 [ 1809.916704] RBP: 0000000020ff9000 R08: 0000000000000008 R09: 0000000000000000 [ 1809.918195] R10: 0000000000008011 R11: 0000000000000206 R12: 00000000200001c0 [ 1809.919692] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1809.921213] CPU: 0 PID: 11159 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 1809.922345] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1809.923680] Call Trace: [ 1809.924113] dump_stack+0x107/0x167 [ 1809.924693] should_fail.cold+0x5/0xa [ 1809.925301] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1809.926229] should_failslab+0x5/0x20 [ 1809.926846] kmem_cache_alloc+0x5b/0x310 [ 1809.927505] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1809.928425] idr_get_free+0x4b5/0x8f0 [ 1809.929060] idr_alloc_u32+0x170/0x2d0 [ 1809.929690] ? __fprop_inc_percpu_max+0x130/0x130 [ 1809.930476] ? lock_acquire+0x197/0x470 [ 1809.931130] ? __kernfs_new_node+0xff/0x860 [ 1809.931831] idr_alloc_cyclic+0x102/0x230 [ 1809.932505] ? idr_alloc+0x130/0x130 [ 1809.933095] ? rwlock_bug.part.0+0x90/0x90 [ 1809.933788] __kernfs_new_node+0x117/0x860 [ 1809.934477] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1809.935242] ? lock_chain_count+0x20/0x20 [ 1809.935922] ? update_load_avg+0x162/0x1870 [ 1809.936608] ? find_held_lock+0x2c/0x110 [ 1809.937263] kernfs_new_node+0x18d/0x250 [ 1809.937924] kernfs_create_dir_ns+0x49/0x160 [ 1809.938637] internal_create_group+0x793/0xb30 [ 1809.939369] ? set_user_nice.part.0+0x2fd/0x760 [ 1809.940110] ? sysfs_remove_group+0x170/0x170 [ 1809.940837] ? lockdep_init_map_type+0x2c7/0x780 [ 1809.941598] ? blk_queue_flag_set+0x22/0x30 [ 1809.942322] ? __loop_update_dio+0x2d2/0x690 [ 1809.943027] loop_configure+0x958/0x1490 [ 1809.943682] lo_ioctl+0xa72/0x1760 [ 1809.944256] ? avc_has_extended_perms+0x7f1/0xf40 [ 1809.945028] ? loop_set_status_old+0x250/0x250 [ 1809.945759] ? avc_ss_reset+0x180/0x180 [ 1809.946405] ? find_held_lock+0x2c/0x110 [ 1809.947067] ? __lock_acquire+0xbb1/0x5b00 [ 1809.947783] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1809.948618] ? generic_block_fiemap+0x60/0x60 [ 1809.949350] ? lock_downgrade+0x6d0/0x6d0 [ 1809.950007] ? build_open_flags+0x6f0/0x6f0 [ 1809.950714] ? loop_set_status_old+0x250/0x250 [ 1809.951444] blkdev_ioctl+0x291/0x710 [ 1809.952065] ? blkdev_common_ioctl+0x1930/0x1930 [ 1809.952827] ? selinux_file_ioctl+0xb6/0x270 [ 1809.953569] block_ioctl+0xf9/0x140 [ 1809.954149] ? blkdev_read_iter+0x1c0/0x1c0 [ 1809.954877] __x64_sys_ioctl+0x19a/0x210 [ 1809.955527] do_syscall_64+0x33/0x40 [ 1809.956252] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1809.957146] RIP: 0033:0x7f3e519658d7 [ 1809.957746] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1809.960652] RSP: 002b:00007f3e4eedaf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1809.961881] RAX: ffffffffffffffda RBX: 00007f3e519af970 RCX: 00007f3e519658d7 [ 1809.963044] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1809.964186] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 1809.965319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1809.966464] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 22:07:45 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 79) [ 1810.062502] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1810.063240] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:07:46 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3", 0x45}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af83", 0xcb}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1810.071758] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1810.076549] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:07:46 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) (fail_nth: 33) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:07:46 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) [ 1810.156043] FAULT_INJECTION: forcing a failure. [ 1810.156043] name failslab, interval 1, probability 0, space 0, times 0 22:07:46 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1810.158443] CPU: 1 PID: 11194 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1810.160006] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1810.161744] Call Trace: [ 1810.162314] dump_stack+0x107/0x167 [ 1810.163079] should_fail.cold+0x5/0xa [ 1810.163877] ? create_object.isra.0+0x3a/0xa20 [ 1810.164831] should_failslab+0x5/0x20 [ 1810.165634] kmem_cache_alloc+0x5b/0x310 [ 1810.166493] create_object.isra.0+0x3a/0xa20 [ 1810.167401] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1810.168443] kmem_cache_alloc+0x159/0x310 [ 1810.169318] vm_area_dup+0x78/0x290 [ 1810.170076] ? memcpy+0x39/0x60 [ 1810.170990] ? visit_groups_merge.constprop.0.isra.0+0x771/0xae0 [ 1810.172262] ? mark_lock+0xf5/0x2df0 [ 1810.173050] ? __lock_acquire+0x1657/0x5b00 [ 1810.173952] ? lock_chain_count+0x20/0x20 [ 1810.174840] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1810.175931] ? lock_downgrade+0x6d0/0x6d0 [ 1810.176792] ? visit_groups_merge.constprop.0.isra.0+0xae0/0xae0 [ 1810.178067] ? rwlock_bug.part.0+0x90/0x90 [ 1810.178961] ? group_sched_out.part.0+0x1a3/0x2e0 [ 1810.179970] ? vm_area_alloc+0x110/0x110 [ 1810.180821] ? __lock_acquire+0x1657/0x5b00 [ 1810.181743] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1810.182843] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1810.183927] ? vmacache_find+0x55/0x2a0 22:07:46 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1800, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1810.184755] __split_vma+0xa8/0x570 [ 1810.185673] __do_munmap+0x365/0x1260 22:07:46 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) [ 1810.186492] ? lock_release+0x680/0x680 [ 1810.187408] mmap_region+0x776/0x1590 [ 1810.188209] ? get_unmapped_area+0x2f0/0x420 [ 1810.189141] do_mmap+0xcdb/0x11e0 [ 1810.189865] vm_mmap_pgoff+0x198/0x1f0 [ 1810.190695] ? randomize_page+0xb0/0xb0 [ 1810.191539] ksys_mmap_pgoff+0x41c/0x560 [ 1810.192389] ? find_mergeable_anon_vma+0x250/0x250 [ 1810.193414] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1810.194518] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1810.195596] do_syscall_64+0x33/0x40 [ 1810.196372] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1810.197441] RIP: 0033:0x7fcc97c5ab62 [ 1810.198216] Code: 00 00 00 00 00 0f 1f 00 41 f7 c1 ff 0f 00 00 75 27 55 48 89 fd 53 89 cb 48 85 ff 74 3b 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 66 5b 5d c3 0f 1f 00 48 c7 c0 bc ff ff ff 64 [ 1810.202070] RSP: 002b:00007fcc951d00f8 EFLAGS: 00000206 ORIG_RAX: 0000000000000009 [ 1810.203662] RAX: ffffffffffffffda RBX: 0000000000008011 RCX: 00007fcc97c5ab62 [ 1810.205141] RDX: 0000000000000003 RSI: 0000000000090140 RDI: 0000000020ff9000 [ 1810.206632] RBP: 0000000020ff9000 R08: 0000000000000008 R09: 0000000000000000 [ 1810.208116] R10: 0000000000008011 R11: 0000000000000206 R12: 00000000200001c0 [ 1810.209603] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 22:07:46 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:07:46 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 80) [ 1810.410711] FAULT_INJECTION: forcing a failure. [ 1810.410711] name failslab, interval 1, probability 0, space 0, times 0 [ 1810.412180] CPU: 0 PID: 11221 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1810.413050] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1810.414087] Call Trace: [ 1810.414434] dump_stack+0x107/0x167 [ 1810.414896] should_fail.cold+0x5/0xa [ 1810.415384] ? anon_vma_clone+0xdc/0x590 [ 1810.415897] should_failslab+0x5/0x20 [ 1810.416378] kmem_cache_alloc+0x5b/0x310 [ 1810.416895] anon_vma_clone+0xdc/0x590 [ 1810.417392] __split_vma+0x17c/0x570 [ 1810.417865] __do_munmap+0x365/0x1260 [ 1810.418366] ? lock_release+0x680/0x680 [ 1810.418879] mmap_region+0x776/0x1590 [ 1810.419366] ? get_unmapped_area+0x2f0/0x420 [ 1810.419928] do_mmap+0xcdb/0x11e0 [ 1810.420372] vm_mmap_pgoff+0x198/0x1f0 [ 1810.420865] ? randomize_page+0xb0/0xb0 [ 1810.421375] ksys_mmap_pgoff+0x41c/0x560 [ 1810.421887] ? find_mergeable_anon_vma+0x250/0x250 [ 1810.422519] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1810.423176] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1810.423822] do_syscall_64+0x33/0x40 [ 1810.424287] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1810.424927] RIP: 0033:0x7fcc97c5ab62 [ 1810.425393] Code: 00 00 00 00 00 0f 1f 00 41 f7 c1 ff 0f 00 00 75 27 55 48 89 fd 53 89 cb 48 85 ff 74 3b 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 66 5b 5d c3 0f 1f 00 48 c7 c0 bc ff ff ff 64 [ 1810.427707] RSP: 002b:00007fcc951d00f8 EFLAGS: 00000206 ORIG_RAX: 0000000000000009 [ 1810.428664] RAX: ffffffffffffffda RBX: 0000000000008011 RCX: 00007fcc97c5ab62 [ 1810.429550] RDX: 0000000000000003 RSI: 0000000000090140 RDI: 0000000020ff9000 [ 1810.430448] RBP: 0000000020ff9000 R08: 0000000000000008 R09: 0000000000000000 [ 1810.431332] R10: 0000000000008011 R11: 0000000000000206 R12: 00000000200001c0 [ 1810.432218] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 22:07:46 executing program 6: getpgid(0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x22902, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_io_uring_complete(0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x5d, 0x0, @thr={&(0x7f00000002c0)="c58435b56fadce6925a8c5ef8299d1c9436890996f121c55fd3949c7ffe74e562d5b7ad3ba81ec2ee03296fc177baf9eb677c3b886f2d2f6f15bbb7648f001000000a7e1de93ae4056fd27712f2d24552e5d7d39ec16e048786d22b4989871bad0f0ee169831b6e6f3e5f6aec27d337087b8119f6d755f6e40547c31e63fdaf4b4593725c72c370172c9527216a415009b28cfab12175e4c530e215b70f7b654b1cc73e9eabfb340bcf589b70ae5e8acd00b6770b80a2a135bf9bd68f3679d8a46b4c50a69d29136daef4804fe9cb5f8caceaeb2b7310d7154d547c522215a4a59b9787a63c4e818bd23c5668aa30f9e030613", &(0x7f0000000540)="2ac7a21c8555cb8161df3e647dcdb023da28a1a647a16e4f8e6fa8febca24d45c7a3d99bb9f57cbd2a9300e181ca7c1e21a348b0080a5409b2a4e4d827024c7bc481ad488ef6fded915ad2c221d17d526fba95e126bf2c8f45e164040e2fc26125b81d14d34a97df6efce3e5b87ef010bd0fd8fd2cad78e0a46b99411deb38836c2a"}}, &(0x7f0000000180)) r1 = socket$netlink(0x10, 0x3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000080)=""/200, 0x20000148}], 0x1, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000003c0)=""/101, 0x65) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000240), &(0x7f0000000440)={'L-', 0x3}, 0x16, 0x3) 22:07:46 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3", 0x45}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af83", 0xcb}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:04 executing program 6: getpgid(0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x22902, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_io_uring_complete(0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x5d, 0x0, @thr={&(0x7f00000002c0)="c58435b56fadce6925a8c5ef8299d1c9436890996f121c55fd3949c7ffe74e562d5b7ad3ba81ec2ee03296fc177baf9eb677c3b886f2d2f6f15bbb7648f001000000a7e1de93ae4056fd27712f2d24552e5d7d39ec16e048786d22b4989871bad0f0ee169831b6e6f3e5f6aec27d337087b8119f6d755f6e40547c31e63fdaf4b4593725c72c370172c9527216a415009b28cfab12175e4c530e215b70f7b654b1cc73e9eabfb340bcf589b70ae5e8acd00b6770b80a2a135bf9bd68f3679d8a46b4c50a69d29136daef4804fe9cb5f8caceaeb2b7310d7154d547c522215a4a59b9787a63c4e818bd23c5668aa30f9e030613", &(0x7f0000000540)="2ac7a21c8555cb8161df3e647dcdb023da28a1a647a16e4f8e6fa8febca24d45c7a3d99bb9f57cbd2a9300e181ca7c1e21a348b0080a5409b2a4e4d827024c7bc481ad488ef6fded915ad2c221d17d526fba95e126bf2c8f45e164040e2fc26125b81d14d34a97df6efce3e5b87ef010bd0fd8fd2cad78e0a46b99411deb38836c2a"}}, &(0x7f0000000180)) r1 = socket$netlink(0x10, 0x3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000080)=""/200, 0x20000148}], 0x1, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000003c0)=""/101, 0x65) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000240), &(0x7f0000000440)={'L-', 0x3}, 0x16, 0x3) 22:08:04 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) 22:08:04 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 81) 22:08:04 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c00, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:04 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:08:04 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x11, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:08:04 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:08:04 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7", 0x50}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af83", 0xcb}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1828.125665] FAULT_INJECTION: forcing a failure. [ 1828.125665] name failslab, interval 1, probability 0, space 0, times 0 [ 1828.127891] CPU: 0 PID: 11245 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1828.129206] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1828.130788] Call Trace: [ 1828.131317] dump_stack+0x107/0x167 [ 1828.132009] should_fail.cold+0x5/0xa [ 1828.132727] ? create_object.isra.0+0x3a/0xa20 [ 1828.133601] should_failslab+0x5/0x20 [ 1828.134312] kmem_cache_alloc+0x5b/0x310 [ 1828.135086] create_object.isra.0+0x3a/0xa20 [ 1828.135896] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1828.136843] kmem_cache_alloc+0x159/0x310 [ 1828.137514] anon_vma_clone+0xdc/0x590 [ 1828.138246] __split_vma+0x17c/0x570 [ 1828.138964] __do_munmap+0x365/0x1260 [ 1828.139699] ? lock_release+0x680/0x680 [ 1828.140438] mmap_region+0x776/0x1590 [ 1828.141172] ? get_unmapped_area+0x2f0/0x420 [ 1828.141998] do_mmap+0xcdb/0x11e0 [ 1828.142657] vm_mmap_pgoff+0x198/0x1f0 [ 1828.143411] ? randomize_page+0xb0/0xb0 [ 1828.144166] ksys_mmap_pgoff+0x41c/0x560 [ 1828.144817] ? find_mergeable_anon_vma+0x250/0x250 [ 1828.145737] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1828.146713] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1828.147692] do_syscall_64+0x33/0x40 [ 1828.148390] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1828.149343] RIP: 0033:0x7fcc97c5ab62 [ 1828.150047] Code: 00 00 00 00 00 0f 1f 00 41 f7 c1 ff 0f 00 00 75 27 55 48 89 fd 53 89 cb 48 85 ff 74 3b 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 66 5b 5d c3 0f 1f 00 48 c7 c0 bc ff ff ff 64 [ 1828.153504] RSP: 002b:00007fcc951d00f8 EFLAGS: 00000206 ORIG_RAX: 0000000000000009 [ 1828.154951] RAX: ffffffffffffffda RBX: 0000000000008011 RCX: 00007fcc97c5ab62 [ 1828.156294] RDX: 0000000000000003 RSI: 0000000000090140 RDI: 0000000020ff9000 [ 1828.157659] RBP: 0000000020ff9000 R08: 0000000000000008 R09: 0000000000000000 [ 1828.159011] R10: 0000000000008011 R11: 0000000000000206 R12: 00000000200001c0 [ 1828.160367] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1828.188576] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:08:04 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 82) 22:08:04 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1828.281580] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1828.287785] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1828.315934] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:08:04 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x16, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) [ 1828.342576] FAULT_INJECTION: forcing a failure. [ 1828.342576] name failslab, interval 1, probability 0, space 0, times 0 [ 1828.345007] CPU: 1 PID: 11266 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1828.346455] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1828.348187] Call Trace: [ 1828.348745] dump_stack+0x107/0x167 [ 1828.349511] should_fail.cold+0x5/0xa [ 1828.350307] ? vm_area_alloc+0x1c/0x110 [ 1828.351148] should_failslab+0x5/0x20 [ 1828.351944] kmem_cache_alloc+0x5b/0x310 [ 1828.352795] vm_area_alloc+0x1c/0x110 [ 1828.353600] mmap_region+0x819/0x1590 22:08:04 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7", 0x50}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af83", 0xcb}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1828.354553] ? get_unmapped_area+0x2f0/0x420 [ 1828.355634] do_mmap+0xcdb/0x11e0 [ 1828.356365] vm_mmap_pgoff+0x198/0x1f0 22:08:04 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) [ 1828.357190] ? randomize_page+0xb0/0xb0 [ 1828.358104] ksys_mmap_pgoff+0x41c/0x560 [ 1828.358966] ? find_mergeable_anon_vma+0x250/0x250 [ 1828.359997] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1828.361093] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1828.362168] do_syscall_64+0x33/0x40 [ 1828.362958] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1828.364024] RIP: 0033:0x7fcc97c5ab62 [ 1828.364801] Code: 00 00 00 00 00 0f 1f 00 41 f7 c1 ff 0f 00 00 75 27 55 48 89 fd 53 89 cb 48 85 ff 74 3b 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 66 5b 5d c3 0f 1f 00 48 c7 c0 bc ff ff ff 64 [ 1828.368652] RSP: 002b:00007fcc951d00f8 EFLAGS: 00000206 ORIG_RAX: 0000000000000009 [ 1828.370245] RAX: ffffffffffffffda RBX: 0000000000008011 RCX: 00007fcc97c5ab62 [ 1828.371749] RDX: 0000000000000003 RSI: 0000000000090140 RDI: 0000000020ff9000 [ 1828.373241] RBP: 0000000020ff9000 R08: 0000000000000008 R09: 0000000000000000 [ 1828.374730] R10: 0000000000008011 R11: 0000000000000206 R12: 00000000200001c0 [ 1828.376227] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 22:08:04 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:04 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1828.466289] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:08:04 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7", 0x50}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af83", 0xcb}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1828.509420] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:08:18 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 83) 22:08:18 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) 22:08:18 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78ea", 0x56}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af83", 0xcb}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:18 executing program 6: getpgid(0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x22902, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_io_uring_complete(0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x5d, 0x0, @thr={&(0x7f00000002c0)="c58435b56fadce6925a8c5ef8299d1c9436890996f121c55fd3949c7ffe74e562d5b7ad3ba81ec2ee03296fc177baf9eb677c3b886f2d2f6f15bbb7648f001000000a7e1de93ae4056fd27712f2d24552e5d7d39ec16e048786d22b4989871bad0f0ee169831b6e6f3e5f6aec27d337087b8119f6d755f6e40547c31e63fdaf4b4593725c72c370172c9527216a415009b28cfab12175e4c530e215b70f7b654b1cc73e9eabfb340bcf589b70ae5e8acd00b6770b80a2a135bf9bd68f3679d8a46b4c50a69d29136daef4804fe9cb5f8caceaeb2b7310d7154d547c522215a4a59b9787a63c4e818bd23c5668aa30f9e030613", &(0x7f0000000540)="2ac7a21c8555cb8161df3e647dcdb023da28a1a647a16e4f8e6fa8febca24d45c7a3d99bb9f57cbd2a9300e181ca7c1e21a348b0080a5409b2a4e4d827024c7bc481ad488ef6fded915ad2c221d17d526fba95e126bf2c8f45e164040e2fc26125b81d14d34a97df6efce3e5b87ef010bd0fd8fd2cad78e0a46b99411deb38836c2a13"}}, &(0x7f0000000180)) r1 = socket$netlink(0x10, 0x3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000080)=""/200, 0x20000148}], 0x1, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000003c0)=""/101, 0x65) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000240), &(0x7f0000000440)={'L-', 0x3}, 0x16, 0x3) 22:08:18 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x18, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:08:18 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x18, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:08:18 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:08:18 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1842.437742] FAULT_INJECTION: forcing a failure. [ 1842.437742] name failslab, interval 1, probability 0, space 0, times 0 [ 1842.439360] CPU: 1 PID: 11319 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1842.440301] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1842.441400] Call Trace: [ 1842.441764] dump_stack+0x107/0x167 [ 1842.442250] should_fail.cold+0x5/0xa [ 1842.442764] ? create_object.isra.0+0x3a/0xa20 [ 1842.443379] should_failslab+0x5/0x20 [ 1842.443893] kmem_cache_alloc+0x5b/0x310 [ 1842.444440] create_object.isra.0+0x3a/0xa20 [ 1842.445044] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1842.445723] kmem_cache_alloc+0x159/0x310 [ 1842.446280] vm_area_alloc+0x1c/0x110 [ 1842.446785] mmap_region+0x819/0x1590 [ 1842.447295] ? get_unmapped_area+0x2f0/0x420 [ 1842.447901] do_mmap+0xcdb/0x11e0 [ 1842.448370] vm_mmap_pgoff+0x198/0x1f0 [ 1842.448887] ? randomize_page+0xb0/0xb0 [ 1842.449424] ksys_mmap_pgoff+0x41c/0x560 [ 1842.449964] ? find_mergeable_anon_vma+0x250/0x250 [ 1842.450620] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1842.451323] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1842.452026] do_syscall_64+0x33/0x40 [ 1842.452530] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1842.453214] RIP: 0033:0x7fcc97c5ab62 [ 1842.453714] Code: 00 00 00 00 00 0f 1f 00 41 f7 c1 ff 0f 00 00 75 27 55 48 89 fd 53 89 cb 48 85 ff 74 3b 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 66 5b 5d c3 0f 1f 00 48 c7 c0 bc ff ff ff 64 [ 1842.456182] RSP: 002b:00007fcc951d00f8 EFLAGS: 00000206 ORIG_RAX: 0000000000000009 [ 1842.457196] RAX: ffffffffffffffda RBX: 0000000000008011 RCX: 00007fcc97c5ab62 [ 1842.458133] RDX: 0000000000000003 RSI: 0000000000090140 RDI: 0000000020ff9000 [ 1842.459080] RBP: 0000000020ff9000 R08: 0000000000000008 R09: 0000000000000000 [ 1842.460036] R10: 0000000000008011 R11: 0000000000000206 R12: 00000000200001c0 [ 1842.460973] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1842.468873] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:08:18 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2e, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) [ 1842.557779] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:08:18 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 84) 22:08:18 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78ea", 0x56}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af83", 0xcb}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1842.583877] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1842.591326] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1842.674613] FAULT_INJECTION: forcing a failure. [ 1842.674613] name failslab, interval 1, probability 0, space 0, times 0 [ 1842.676078] CPU: 1 PID: 11343 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1842.676918] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1842.677918] Call Trace: [ 1842.678241] dump_stack+0x107/0x167 [ 1842.678684] should_fail.cold+0x5/0xa [ 1842.679147] ? create_object.isra.0+0x3a/0xa20 [ 1842.679710] should_failslab+0x5/0x20 [ 1842.680170] kmem_cache_alloc+0x5b/0x310 [ 1842.680643] create_object.isra.0+0x3a/0xa20 [ 1842.681172] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1842.681761] kmem_cache_alloc+0x159/0x310 [ 1842.682240] anon_vma_clone+0xdc/0x590 [ 1842.682691] __split_vma+0x17c/0x570 [ 1842.683119] __do_munmap+0x365/0x1260 [ 1842.683591] ? lock_release+0x680/0x680 [ 1842.684048] mmap_region+0x776/0x1590 [ 1842.684509] ? get_unmapped_area+0x2f0/0x420 [ 1842.685009] do_mmap+0xcdb/0x11e0 [ 1842.685433] vm_mmap_pgoff+0x198/0x1f0 [ 1842.685885] ? randomize_page+0xb0/0xb0 [ 1842.686366] ksys_mmap_pgoff+0x41c/0x560 [ 1842.686832] ? find_mergeable_anon_vma+0x250/0x250 [ 1842.687396] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1842.688001] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1842.688620] do_syscall_64+0x33/0x40 [ 1842.689052] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1842.689666] RIP: 0033:0x7fcc97c5ab62 [ 1842.690093] Code: 00 00 00 00 00 0f 1f 00 41 f7 c1 ff 0f 00 00 75 27 55 48 89 fd 53 89 cb 48 85 ff 74 3b 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 66 5b 5d c3 0f 1f 00 48 c7 c0 bc ff ff ff 64 [ 1842.691781] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1842.692195] RSP: 002b:00007fcc951d00f8 EFLAGS: 00000206 ORIG_RAX: 0000000000000009 [ 1842.692207] RAX: ffffffffffffffda RBX: 0000000000008011 RCX: 00007fcc97c5ab62 [ 1842.692214] RDX: 0000000000000003 RSI: 0000000000090140 RDI: 0000000020ff9000 [ 1842.692221] RBP: 0000000020ff9000 R08: 0000000000000008 R09: 0000000000000000 [ 1842.692227] R10: 0000000000008011 R11: 0000000000000206 R12: 00000000200001c0 [ 1842.692233] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 22:08:18 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6200, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:18 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:08:18 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:08:18 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) [ 1842.826608] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:08:33 executing program 6: getpgid(0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x22902, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_io_uring_complete(0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x5d, 0x0, @thr={&(0x7f00000002c0)="c58435b56fadce6925a8c5ef8299d1c9436890996f121c55fd3949c7ffe74e562d5b7ad3ba81ec2ee03296fc177baf9eb677c3b886f2d2f6f15bbb7648f001000000a7e1de93ae4056fd27712f2d24552e5d7d39ec16e048786d22b4989871bad0f0ee169831b6e6f3e5f6aec27d337087b8119f6d755f6e40547c31e63fdaf4b4593725c72c370172c9527216a415009b28cfab12175e4c530e215b70f7b654b1cc73e9eabfb340bcf589b70ae5e8acd00b6770b80a2a135bf9bd68f3679d8a46b4c50a69d29136daef4804fe9cb5f8caceaeb2b7310d7154d547c522215a4a59b9787a63c4e818bd23c5668aa30f9e030613", &(0x7f0000000540)="2ac7a21c8555cb8161df3e647dcdb023da28a1a647a16e4f8e6fa8febca24d45c7a3d99bb9f57cbd2a9300e181ca7c1e21a348b0080a5409b2a4e4d827024c7bc481ad488ef6fded915ad2c221d17d526fba95e126bf2c8f45e164040e2fc26125b81d14d34a97df6efce3e5b87ef010bd0fd8fd2cad78e0a46b99411deb38836c2a13"}}, &(0x7f0000000180)) r1 = socket$netlink(0x10, 0x3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000080)=""/200, 0x20000148}], 0x1, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000003c0)=""/101, 0x65) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000240), &(0x7f0000000440)={'L-', 0x3}, 0x16, 0x3) 22:08:33 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x62, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:08:33 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x38, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:08:33 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8004, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:33 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78ea", 0x56}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af83", 0xcb}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:33 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:08:33 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, 0x0) 22:08:33 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 85) [ 1857.167886] FAULT_INJECTION: forcing a failure. [ 1857.167886] name failslab, interval 1, probability 0, space 0, times 0 [ 1857.170617] CPU: 0 PID: 11379 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1857.172226] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1857.174106] Call Trace: [ 1857.174699] dump_stack+0x107/0x167 [ 1857.175541] should_fail.cold+0x5/0xa [ 1857.176423] ? ptlock_alloc+0x1d/0x70 [ 1857.177292] should_failslab+0x5/0x20 [ 1857.178147] kmem_cache_alloc+0x5b/0x310 [ 1857.179063] ptlock_alloc+0x1d/0x70 [ 1857.179948] pte_alloc_one+0x68/0x1a0 [ 1857.180810] __pte_alloc+0x1d/0x330 [ 1857.181632] remap_pfn_range_internal+0x9a3/0xf60 [ 1857.182718] ? lookup_memtype+0x5b/0x200 [ 1857.183643] ? apply_to_existing_page_range+0x40/0x40 [ 1857.184817] remap_pfn_range+0xcd/0x160 [ 1857.185710] ? remap_pfn_range_notrack+0x70/0x70 [ 1857.186782] ? memcg_slab_post_alloc_hook+0x17a/0x430 [ 1857.187963] io_uring_mmap+0x398/0x530 [ 1857.188884] mmap_region+0xb5a/0x1590 [ 1857.189763] do_mmap+0xcdb/0x11e0 [ 1857.190544] vm_mmap_pgoff+0x198/0x1f0 [ 1857.191428] ? randomize_page+0xb0/0xb0 [ 1857.192336] ksys_mmap_pgoff+0x41c/0x560 [ 1857.193238] ? find_mergeable_anon_vma+0x250/0x250 [ 1857.194331] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1857.195495] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1857.196651] do_syscall_64+0x33/0x40 [ 1857.197477] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1857.198615] RIP: 0033:0x7fcc97c5ab62 [ 1857.199439] Code: 00 00 00 00 00 0f 1f 00 41 f7 c1 ff 0f 00 00 75 27 55 48 89 fd 53 89 cb 48 85 ff 74 3b 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 66 5b 5d c3 0f 1f 00 48 c7 c0 bc ff ff ff 64 [ 1857.203513] RSP: 002b:00007fcc951d00f8 EFLAGS: 00000206 ORIG_RAX: 0000000000000009 [ 1857.205200] RAX: ffffffffffffffda RBX: 0000000000008011 RCX: 00007fcc97c5ab62 [ 1857.206777] RDX: 0000000000000003 RSI: 0000000000090140 RDI: 0000000020ff9000 [ 1857.208363] RBP: 0000000020ff9000 R08: 0000000000000008 R09: 0000000000000000 [ 1857.209940] R10: 0000000000008011 R11: 0000000000000206 R12: 00000000200001c0 [ 1857.211520] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1857.232197] ------------[ cut here ]------------ [ 1857.233017] WARNING: CPU: 1 PID: 11379 at arch/x86/mm/pat/memtype.c:1019 get_pat_info+0x216/0x270 [ 1857.234405] Modules linked in: [ 1857.234888] CPU: 1 PID: 11379 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 1857.236002] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1857.237286] RIP: 0010:get_pat_info+0x216/0x270 [ 1857.238066] Code: c1 ea 03 80 3c 02 00 75 71 49 89 1e eb 8e e8 01 88 2e 00 0f 0b e9 97 fe ff ff 41 bc ea ff ff ff e9 77 ff ff ff e8 ea 87 2e 00 <0f> 0b 41 bc ea ff ff ff e9 65 ff ff ff 4c 89 ff e8 b5 7d 5a 00 e9 [ 1857.241239] RSP: 0018:ffff8880495af8b0 EFLAGS: 00010212 [ 1857.243161] RAX: 00000000000130e4 RBX: ffff8880182d1c00 RCX: ffffc90000de8000 [ 1857.246180] RDX: 0000000000040000 RSI: ffffffff81123696 RDI: 0000000000000007 [ 1857.248494] RBP: ffff8880495af968 R08: 0000000000000000 R09: ffff8880495af838 [ 1857.249599] R10: 0000000000000020 R11: 0000000000000001 R12: 0000000000000028 [ 1857.250710] R13: 1ffff110092b5f16 R14: 0000000000000000 R15: ffff8880182d1c50 [ 1857.251814] FS: 00007fcc951d0700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 1857.253098] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1857.254002] CR2: 00007f3573bf9000 CR3: 000000000d294000 CR4: 0000000000350ee0 [ 1857.255101] Call Trace: [ 1857.255503] ? __warn+0xe2/0x1f0 [ 1857.256066] ? get_pat_info+0x216/0x270 [ 1857.256687] ? report_bug+0x1c1/0x210 [ 1857.257301] ? handle_bug+0x41/0x90 [ 1857.257849] ? exc_invalid_op+0x14/0x50 [ 1857.258484] ? asm_exc_invalid_op+0x12/0x20 [ 1857.259170] ? get_pat_info+0x216/0x270 [ 1857.259764] ? get_pat_info+0x216/0x270 [ 1857.260417] ? pgprot_writethrough+0xc0/0xc0 [ 1857.261121] ? finish_task_switch+0x126/0x5d0 [ 1857.261801] untrack_pfn+0xdc/0x240 [ 1857.262377] ? track_pfn_insert+0x150/0x150 [ 1857.263062] ? lock_downgrade+0x6d0/0x6d0 [ 1857.263686] ? uprobe_munmap+0x1c/0x560 [ 1857.264333] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1857.265150] unmap_single_vma+0x1bc/0x300 [ 1857.265775] zap_page_range_single+0x2ce/0x450 [ 1857.266491] ? unmap_single_vma+0x300/0x300 [ 1857.267170] ? remap_pfn_range_internal+0xc56/0xf60 [ 1857.267977] ? lookup_memtype+0x5b/0x200 [ 1857.268597] ? apply_to_existing_page_range+0x40/0x40 [ 1857.269404] remap_pfn_range+0x139/0x160 [ 1857.270045] ? remap_pfn_range_notrack+0x70/0x70 [ 1857.270756] ? memcg_slab_post_alloc_hook+0x17a/0x430 [ 1857.271566] io_uring_mmap+0x398/0x530 [ 1857.272205] mmap_region+0xb5a/0x1590 [ 1857.272790] do_mmap+0xcdb/0x11e0 [ 1857.273349] vm_mmap_pgoff+0x198/0x1f0 [ 1857.273971] ? randomize_page+0xb0/0xb0 [ 1857.274581] ksys_mmap_pgoff+0x41c/0x560 [ 1857.275218] ? find_mergeable_anon_vma+0x250/0x250 [ 1857.276010] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1857.276794] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1857.277604] do_syscall_64+0x33/0x40 [ 1857.278193] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1857.278992] RIP: 0033:0x7fcc97c5ab62 [ 1857.279564] Code: 00 00 00 00 00 0f 1f 00 41 f7 c1 ff 0f 00 00 75 27 55 48 89 fd 53 89 cb 48 85 ff 74 3b 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 66 5b 5d c3 0f 1f 00 48 c7 c0 bc ff ff ff 64 [ 1857.282313] RSP: 002b:00007fcc951d00f8 EFLAGS: 00000206 ORIG_RAX: 0000000000000009 [ 1857.283461] RAX: ffffffffffffffda RBX: 0000000000008011 RCX: 00007fcc97c5ab62 [ 1857.284559] RDX: 0000000000000003 RSI: 0000000000090140 RDI: 0000000020ff9000 [ 1857.285627] RBP: 0000000020ff9000 R08: 0000000000000008 R09: 0000000000000000 [ 1857.286700] R10: 0000000000008011 R11: 0000000000000206 R12: 00000000200001c0 [ 1857.287790] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1857.288895] irq event stamp: 2027 [ 1857.289435] hardirqs last enabled at (2037): [] console_unlock+0x92d/0xb40 [ 1857.290712] hardirqs last disabled at (2046): [] console_unlock+0x839/0xb40 [ 1857.292019] softirqs last enabled at (1694): [] asm_call_irq_on_stack+0x12/0x20 [ 1857.293345] softirqs last disabled at (1689): [] asm_call_irq_on_stack+0x12/0x20 [ 1857.294671] ---[ end trace 24811f973ad738c7 ]--- [ 1857.316839] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1857.319903] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 1857.332677] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:08:33 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:08:33 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 22:08:33 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f57d002e6e9a82a659aec93053937351de9633e29fac912e2e2f7d696c65"]) syz_io_uring_setup(0x3164, &(0x7f0000000140)={0x0, 0xf584, 0x2, 0x1, 0x2fb, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) (fail_nth: 86) [ 1857.412456] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:08:33 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, 0x0) 22:08:33 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5c, 0x5, &(0x7f0000000440)=[{&(0x7f0000000540)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f00000003c0)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r1) 22:08:33 executing program 2: perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0xff}, 0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000080)={0xa, 0x4e22, 0x6d, @local, 0x3}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="71413950de33a9ce1fafa2f740ae5945f35a6be7552e955851bb843b83805fa0ff3bb959c347f939341bc8f5c5274594faa3034f06cb3af391854364bd40820963929b7ec5d9abba03e49f52376235646953e4dcc5b489d3e2477680f13f75fced57f058730e2674f2df68debfbd8557894dca65cd5b4daa3c258489d73cb08aaa62dbb1d347e7c7af7d07e4a56fc347d4c34fff44ec3d5f9cc0a5bfb4e5008af4c4c71b7bbbf554864b297b46c8ae3c3bea6762f106e3a10e185b24f084c81ff7e709329d9b1b3ee9c2fdfec95c0e207f6d3a62d0603edd19825c5d7089619b9de3eae174fe9f9f3700e5f5ffe5284339aa1631c0624057", 0xf8}, {&(0x7f0000000780)="498088d62f3241f1bb1b5111c98c0f6b9114eb93c71d21dfaf14cafebf10a5d6d3c713e4eaa887714f656aead96fa6b4832c7fc81acea08eba42090aaf182da4948bc7aa9a467fb3fe86c06ac9f00fe6871fba4375217a1e79ee8acaa250361d71349314bb714d00baa5bc8c2ee26239292f45c5424084f9abd1e147fef9cff985e0a63a3e5388f14a7b404fdec4bba7f10fea1ca76aa45a96c4ce8721c1689bb07e5eef867543f9b3e1338dfe09e676a8", 0xb1}, {&(0x7f0000000b40)="5fdeeb640622c75e68499278185444715f8ea7f25b450446895fda2ed1e973a4ed704c5fb4908926e424296833f6b8eaf6927a36f2d5fc17447accd2f33c5d5e698b2586f3ae2b58b3dc7c88b58df6f7aa29b2bc78eacdd556", 0x59}, {&(0x7f0000001c00)="0e2a1a49e64bb85095b155adba627c5b47ab70959103d33c28ed2c47eb5e83fd6b5d36464af82f70bddcfbf9f8078c5d0b00a80008e638c54078991c9f92a7dabf0d8ba308477646f873492836aa60c0f3b2b5b65acafcac9859ea51f22d5d208ed90815dc3556e93b14deea669ebda98fe5c57efadebcf2cb1a7c1ac2c4bfad253b35e157d8f715b533e1640720643292f37f3905231f7070888b0660bad213b4c259d9591fbf686b076f457f6768e8ce4049b7cf44d814493b5148b17138d6da9cfbad590cc0b692af83", 0xcb}, {&(0x7f0000001d00)="050e9afd4e4f4cfd32fb7750d5612b0e0ea2b9ffbeb9e2797bde135bb3051f8b87d93de7532e534101aea47fdeff06f8ce7d3b3332959014ad7fcd6fe36ea6891ed2942e21025318e8546bd39b18abb92cd869672adecff4d3347b0506aea349ce0d5f", 0x63}, {&(0x7f0000001d80)="302c6c2d105d13fcdfed0771864e3953173aa69a06980c17cd", 0x19}], 0x6, &(0x7f0000001e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffc}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1fe, 0x2, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x68}, 0x800) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') lseek(r3, 0x0, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1010, r3, 0x285d000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_virt_wifi\x00', {0x2, 0x0, @multicast1}}) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000008c0)="814a4c743e61e4b3eddd8296aa1f81942aa0dfe85c5bc5517069453e88fe11345f45a1a7a1cf90b49c37df97e91f485c46af03d6ff777ffc54f03b4ec840747a359b01f6eab03ca2f3d5e6db43d39009a7584c354401fd5ddd3fd41d66a1124996fc0945c03ada69d8d5e3bbd46ade7440495ff30f851d7ce2858097e4584de5b19763244e09404ebbf835e04c307f005df432bfdab94d53511b3efc0c8afc2c61dc16e965dff8c761204772aaf700f37e219b7ee78f8db9b66292d78fe99cc74133caf93b81d196db1be96cb31d", 0xce}, {&(0x7f00000001c0)="7d08b4ad2f749207eb41afba95b8b95d0cdcddf079a37f9e450dde3d43fa750fe64ad891e8cdfa035cac5b476c0210ac23dc53bff80313ff3fc7e2dd9301eca789fe40a81133ebd034f3975a8466d3acb75a7364f1650e16cd5f39c61fa7a512430cd2f65735dde7690dcdb49d3a25269b81644c60f99786d766e894af50ca211e365330c33659fa891e91", 0x8b}], 0x2}, 0x20008000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000000840)=[{&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {0x0}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:33 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, 0x0) [ 1857.544397] FAULT_INJECTION: forcing a failure. [ 1857.544397] name failslab, interval 1, probability 0, space 0, times 0 [ 1857.546876] CPU: 0 PID: 11415 Comm: syz-executor.0 Tainted: G W 5.10.230 #1 [ 1857.548659] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1857.550437] Call Trace: [ 1857.551020] dump_stack+0x107/0x167 [ 1857.551808] should_fail.cold+0x5/0xa [ 1857.552646] ? create_object.isra.0+0x3a/0xa20 [ 1857.553627] should_failslab+0x5/0x20 [ 1857.554432] kmem_cache_alloc+0x5b/0x310 [ 1857.555355] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1857.556671] create_object.isra.0+0x3a/0xa20 [ 1857.557608] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1857.558707] kmem_cache_alloc+0x159/0x310 [ 1857.559618] ptlock_alloc+0x1d/0x70 [ 1857.560403] pte_alloc_one+0x68/0x1a0 [ 1857.561218] __pte_alloc+0x1d/0x330 [ 1857.562103] remap_pfn_range_internal+0x9a3/0xf60 [ 1857.563415] ? lookup_memtype+0x5b/0x200 [ 1857.564531] ? apply_to_existing_page_range+0x40/0x40 [ 1857.565925] remap_pfn_range+0xcd/0x160 [ 1857.566805] ? remap_pfn_range_notrack+0x70/0x70 [ 1857.567820] ? memcg_slab_post_alloc_hook+0x17a/0x430 [ 1857.568948] io_uring_mmap+0x398/0x530 [ 1857.569782] mmap_region+0xb5a/0x1590 [ 1857.570656] do_mmap+0xcdb/0x11e0 [ 1857.571409] vm_mmap_pgoff+0x198/0x1f0 [ 1857.572267] ? randomize_page+0xb0/0xb0 [ 1857.573129] ksys_mmap_pgoff+0x41c/0x560 [ 1857.573995] ? find_mergeable_anon_vma+0x250/0x250 [ 1857.575054] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1857.576189] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1857.577292] do_syscall_64+0x33/0x40 [ 1857.578096] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1857.579216] RIP: 0033:0x7fcc97c5ab62 [ 1857.580026] Code: 00 00 00 00 00 0f 1f 00 41 f7 c1 ff 0f 00 00 75 27 55 48 89 fd 53 89 cb 48 85 ff 74 3b 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 66 5b 5d c3 0f 1f 00 48 c7 c0 bc ff ff ff 64 [ 1857.583978] RSP: 002b:00007fcc951d00f8 EFLAGS: 00000206 ORIG_RAX: 0000000000000009 [ 1857.585598] RAX: ffffffffffffffda RBX: 0000000000008011 RCX: 00007fcc97c5ab62 [ 1857.587124] RDX: 0000000000000003 RSI: 0000000000090140 RDI: 0000000020ff9000 [ 1857.588711] RBP: 0000000020ff9000 R08: 0000000000000008 R09: 0000000000000000 [ 1857.590384] R10: 0000000000008011 R11: 0000000000000206 R12: 00000000200001c0 [ 1857.591923] R13: 0000000020ff9000 R14: 0000000020000040 R15: 0000000020ff9000 [ 1857.615255] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 22:08:33 executing program 5: r0 = memfd_create(&(0x7f0000000340), 0x1) write(0xffffffffffffffff, &(0x7f0000000180)="d9739d", 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[], 0xfdef) fallocate(r1, 0x3, 0x0, 0x8000008000) copy_file_range(r0, &(0x7f00000001c0)=0x1800000000, r1, &(0x7f0000000200)=0x20, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x2d, 0x8000}) pwritev2(r2, &(0x7f0000000140)=[{&(0x7f0000000040)='u', 0x1}], 0x1, 0x100009, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000002c0)={'wg0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x300000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff, 0x1ff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x0, 0x80, 0x3, 0x8, 0x81, 0x7e, 0x0, 0x3, 0x112a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2020, 0x7, 0x2, 0x0, 0xf73, 0x1ff, 0x1000, 0x0, 0x4ee0, 0x0, 0xffffffffffffffea}) VM DIAGNOSIS: 22:08:33 Registers: info registers vcpu 0 RAX=00005596d0422ab0 RBX=00000000000010b0 RCX=00000000000000a1 RDX=00007fa57df91c70 RSI=0000000000000000 RDI=00005596d04134c0 RBP=00007fa57df91b80 RSP=00007ffcd87887f0 R8 =0000000000000000 R9 =00005596cfba30f3 R10=0000000000000018 R11=00005596cfba30f0 R12=00005596d04124b0 R13=00005596d04134c0 R14=00000000000000a0 R15=00005596d042de00 RIP=00007fa57de59715 RFL=00000246 [---Z-P-] CPL=3 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0033 0000000000000000 ffffffff 00a0fb00 DPL=3 CS64 [-RA] SS =002b 0000000000000000 ffffffff 00c0f300 DPL=3 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fa57da128c0 00000000 00000000 GS =0000 0000000000000000 00000000 00000000 LDT=0000 fffffe7600000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00005596d040dcd8 CR3=00000000208cc000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00005596d0411cf000005596d0411cd0 XMM01=000000010000000900005596d0411cf0 XMM02=00005596d0413be00000000000000000 XMM03=00005596cfba30d000005596d040bd80 XMM04=000000030000000000005596cfba30d0 XMM05=00005596d042741000005596d0413be0 XMM06=000000000000000000000000ffffffff XMM07=00000000000000000000000000000000 XMM08=2f63697361622f6372732f2e2e000d0a XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000066 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822dd241 RDI=ffffffff879f1140 RBP=ffffffff879f1100 RSP=ffff8880495af2c8 R8 =0000000000000001 R9 =0000000000000003 R10=0000000000000000 R11=0000000000000001 R12=0000000000000066 R13=0000000000000066 R14=ffffffff879f1100 R15=dffffc0000000000 RIP=ffffffff822dd298 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fcc951d0700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe3300000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f3573bf9000 CR3=000000000d294000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000ff0000 XMM01=6a6e695f31313230385f7a7973006273 XMM02=000000000000000000ffffffff000000 XMM03=935330c9ae59a6829a6e2e007df50000 XMM04=ffffffffffffffffffffffff00000000 XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000